Cover Image
Market Research Report

The Internet of Things For Security Providers

Published by Juniper Research Product code 422971
Published Content info
Delivery time: 1-2 business days
Price
Back to Top
The Internet of Things For Security Providers
Published: July 11, 2018 Content info:
Description

Overview

Juniper's latest ‘Internet of Things for Security Providers’ research offers critical analysis of the IoT (Internet of Things) cybersecurity landscape; providing in-depth coverage of key strategic approaches for securing IoT deployments. It examines the present landscape, as well as offering valuable insight into future challenges and how they can be addressed.

Juniper's incisive research provides additional analysis into the changing technological landscape of the IoT; examining how both edge computing and LPWAN (Low Power Wide Area Network) technologies are likely to impact future security requirements.

Juniper's security dataset covers key IoT market segments, including:

  • Consumer
  • Industrial
  • Public Services

This research suite comprises:

  • Deep Dive Strategy & Competition (PDF)
  • 5 Year Deep Dive Data & Forecasting (PDF & Excel)
  • Executive Summary & Core Findings (PDF)

Key Features

  • IoT Security Analyses: Including current and future strategies, challenges and approaches for:
    • Security by Design
    • Lifecycle Management
    • Identity Management
    • Behavioural Analysis
    • Legislation
  • Sector Dynamics: Analyses of future implications for IoT security in terms of:
    • Edge Computing
    • Low Power Wide Area Networks
  • Juniper Leaderboard: 12 IoT solution vendors compared, scored and positioned on the Juniper Leaderboard matrix, including:
    • achelos
    • Carbon Black
    • CyberArk
    • Darktrace
    • FireEye
    • Gemalto
    • Giesecke+Devrient
    • Optiv
    • Palo Alto Networks
    • Positive Technologies
    • Rubicon Labs
    • Symantec
  • Benchmark Industry Forecasts: Market forecasts for IoT security spend across key segments:
    • Consumer: Smart Home, Connected Cars, Digital Health
    • Industrial: Retail, Connected Buildings, Agriculture
    • Public Services: Smart Street Lighting, Smart Energy, Smart Traffic & Parking

Key Questions

  • 1. Which verticals in the IoT are poised as high growth security markets?
  • 2. What factors will play the most significant role in determining IoT security spend?
  • 3. How must customers approach the IoT in terms of cybersecurity risk management?
  • 4. What are the key strategic challenges for IoT security?
  • 5. What is the future outlook for the market in terms of architecture and technology?

Companies Referenced

  • Interviewed: achelos, ADLINK, Gemalto, Giesecke+Devrient, OpenFog Consortium, Vodafone.
  • Profiled: achelos, Carbon Black, CyberArk, Darktrace, FireEye, Gemalto, Giesecke+Devrient, Optiv, Palo Alto Networks, Positive Technologies, Rubicon Labs, Symantec.
  • Case Studied: OpenFog Consortium.
  • Mentioned: Accenture, Akamai, Allianz, Amazon, Apple, Arm, Array Networks, Avancial, Belden, BH Global, Blue Coat, BMC Software, Box, BT, C3 Alliance, Caterpillar, Check Point Software Technologies, Cisco, Comodo, Comptel, Conexsys, Conjur, CriticalBlue, Cumulocity, Cyber Security Coalition, Cybereason, Decision Lab, Dell, Deloitte, Deutsche Post, Dialog Semiconductor, Didi Chuxing, DigiCert, Dropbox, Duo Security, Equifax, Ericsson, Ernst & Young, Evident.io, FlowThings, ForeScout, Foxconn, G Suite, Google, HP, IBM, IDnow, Ingenu, Intel, Invotas, IoT Cybersecurity Alliance, iSight Partners, Juniper Networks, Katerra, Kite Distribution, KKR, LightCyber, LinkedIn, Lockheed-Martin, LogRhythm, M2MD, MAS (Monetary Authority of Singapore), Metro Bank, Micron, Microsoft, Motorola, Murata, NATO, Nokia, Numerex, NVIDIA, NXP, Oracle, Otono Networks, Petuum, Peugeot, Pitney Bowes, Proofpoint, Prudential, PwC, Qualcomm, Qualys, Rapid7, Rockwell Automation, SailPoint, Salesforce, Samsung, SAP, Secdo, secunet, SecureAuth, Semtech, Sharp, Sierra Wireless, Sigfox, Silego, SK Telecom, Société Générale, Softbank, Software AG, Splunk, STMicroelectronics, Tanium, Telefónica, Telstra, Tenable Network Security, Texas Instruments, Thales, Toppan, Toyota, Tripwire, UniCredit, Uptake, Varonis, Vaultive, Viptela, Visa, VMWare, WolfSSL, X15, Zementis.

Data & Interactive Forecast

Juniper's ‘Internet of Things’ forecast suite includes:

  • Forecasts for 8 key regions as well as 11 countries including:
    • Canada
    • China
    • Denmark
    • Germany
    • Japan
    • Norway
    • Portugal
    • Spain
    • Sweden
    • UK
    • US
  • IoT Devices
    • Consumer Devices
    • All Other IoT Devices (Industrial & Enterprise)
  • Consumer Market
    • Smart Home, Connected Vehicles, Digital Health Monitoring
    • Product/Service Provider Security Spend
  • Industrial Market
    • Retail, Connected Buildings, Agriculture
    • End-customer Security Spend
  • Public Services Market
    • Smart Street Lighting, Smart Metering, Smart Grid Distribution Automation, Smart Traffic Management, Smart Parking
    • End-customer Security Spend
  • Interactive Scenario Tool allowing users to manipulate Juniper's data for 12 different metrics.
  • Access to the full set of forecast data of 30 tables and over 4,000 datapoints.

Juniper Research's highly granular interactive Excels enable clients to manipulate Juniper's forecast data and charts to test their own assumptions using the Interactive Scenario Tool; and compare select markets side by side in customised charts and tables. IFxls greatly increase clients' ability to both understand a particular market and to integrate their own views into the model.

Table of Contents

Table of Contents

Deep Dive Strategy & Competition

1. IoT 2018: Investments & Market Movements

  • 1.1 Introduction
  • 1.2 IoT Development Phases
    • Figure 1.1: Juniper Phased Evolution Model: Internet of Things
    • 1.2.1 State of Market Development in the Enterprise & Public Space
  • 1.3 Definition of the Internet of Things
  • 1.4 M&A and Investment Activity
    • 1.4.1 M&A (Mergers & Acquisitions)
    • 1.4.2 Key Investment Activity

2. IoT Cybersecurity Strategic Outlook

  • 2.1 Introduction
  • 2.2 Core Recommendation: Security by Design
  • 2.3 Changing Cybersecurity Requirements
    • 2.3.1 Behavioural Analysis
      • Case Study: Cerber - Evading Machine Learning
  • 2.4 Impact of the IoT
    • 2.4.1 The Case for Decentralised Storage
    • 2.4.2 Identity Management
      • i. Weaknesses in Digital Certificates
        • Figure 2.1: Illicit CA Certificate Marketplace
      • ii. The Need for Lifecycle Management
    • 2.4.3 Cybersecurity Legislation
      • Case Study: Internet of Things (IoT) Cybersecurity Improvement Act of 2017
  • 2.5 IoT Architecture: Edge Computing
    • Figure 2.2: Classic IoT Deployment Architecture
    • i. Key Impacts
    • ii. Current Landscape
      • Figure 2.3: Edge vs Fog
    • iii. Future Outlook: required Strategic Considerations
      • Case Study: OpenFog Consortium
    • iv. Deployment Models
    • v. Service Models
  • 2.6 IoT Technologies: LPWAN Technology Impact Analysis
    • Table 2.4: LPWAN Technology Impact Analysis, Present Landscape
    • 2.6.2 Future Outlook: Required Strategic Considerations

3. IoT Vendor Analysis

  • 3.1 Introduction
    • Table 3.1: IoT Cybersecurity Vendor Capability Assessment Criteria
    • 3.1.1 Leaderboard Scoring Results
      • Table 3.2: Juniper Leaderboard: IoT Cybersecurity Solutions Vendors
      • Figure 3.3: Juniper Leaderboard: IoT Cybersecurity Solutions Vendors
    • 3.1.2 Vendor Groupings
      • i. Established Leaders
      • ii. Leading Challengers
      • iii. Disruptors & Emulators
    • 3.1.3 Limitations & Interpretations
  • 3.2 IoT Cybersecurity Movers & Shakers
  • 3.3 Vendor Analysis
    • 3.3.1 achelos
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Strategic Development Opportunities
    • 3.3.2 Carbon Black
      • i. Corporate Profile
        • Table 3.4: Carbon Black Financial Snapshot ($m) 2015-2017
        • Table 3.5: Carbon Black Recent Acquisitions
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 3.3.3 CyberArk
      • i. Corporate Profile
        • Table 3.6: CyberArk Financial Snapshot ($m) 2015-2017
        • Table 3.7: CyberArk Recent Acquisitions
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 3.3.4 Darktrace
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 3.3.5 FireEye
      • i. Corporate Profile
        • Table 3.8: FireEye Financial Snapshot ($m) 2015-2017
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 3.3.6 Gemalto
      • i. Corporate
        • Table 3.9: Gemalto Financial Snapshot 2015-2017
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 3.3.7 Giesecke+Devrient
      • i. Corporate Profile
        • Table 3.10: G+D Financial Snapshot (€m) 2015-2017
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 3.3.8 Optiv
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 3.3.9 Palo Alto Networks
      • i. Corporate Profile
        • Table 3.11: Palo Alto Networks Financial Snapshot ($m) 2015-2017
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 3.3.10 Positive Technologies
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High Level View of IoT Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 3.3.11 Rubicon Labs
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Strategic Development Opportunities
    • 3.3.12 Symantec
      • i. Corporate Profile
        • Table 3.12: Symantec Financial Snapshot ($m) 2016-2018
        • Table 3.13: Recent Symantec Acquisitions
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of IoT Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities

Deep Dive Data & Forecasting

1. IoT Market Landscape

  • 1.1 Introduction
  • 1.2 IoT Development Phases
    • Figure 1.1: Juniper Phased Evolution Model: Internet of Things
    • 1.2.1 State of Market Development in the Enterprise & Public Space
  • 1.3 Definition of the Internet of Things

2. IoT Cybersecurity: Forecast Summary

  • 2.1 Introduction
    • 2.1.1 Devices
  • 2.2 Segments & Spend Model
  • 2.3 Methodology & Assumptions
    • Figure 2.1: IoT Cybersecurity Spend Methodology
  • 2.4 Total Regional IoT Cybersecurity Spend
    • Figure & Table 2.2: Total Small, Medium & Large Business Spend on IoT Cybersecurity ($m), Split by 8 Key Regions 2018-2023
  • 2.5 Total Segment IoT Cybersecurity Spend
    • Figure & Table 2.3: Total Small, Medium & Large Business Spend on IoT Cybersecurity ($m), Split by IoT Segment 2018-2023
  • 2.6 Connected Devices Summary
    • 2.6.1 Consumer IoT Units
      • Figure & Table 2.4: Installed Base Consumer IoT Units (m), Split by 8 Key Regions 2018-2023
    • 2.6.2 Other IoT Units
      • Figure & Table 2.5: Other IoT Unit Installed Base (m), Split by 8 Key Regions 2018-2023
    • 2.6.3 Total IoT Installed Base
      • Figure & Table 2.6: Total IoT Unit Installed Base (m), Split by 8 Key Regions 2018-2023

3. Consumer Markets: IoT Cybersecurity Spend

  • 3.1 Introduction
  • 3.2 Home Automation Cybersecurity Spend
    • Figure & Table 3.1: Home Automation Vendor Annual Spend on IoT Cybersecurity ($m), Split by 8 Key Regions 2018-2023
  • 3.3 Connected Consumer Vehicle Cybersecurity Spend
    • Figure & Table 3.2: Consumer Connected Vehicle Vendor Annual Spend on Cybersecurity ($m), Split by 8 Key Regions 2018-2023
  • 3.4 Digital Health Cybersecurity Spend
    • Figure & Table 3.3: Digital Health Vendor Annual Spend on Cybersecurity ($m), Split by 8 Key Regions 2018-2023

4. Industrial Markets: IoT Cybersecurity Spend

  • 4.1 Introduction
  • 4.2 Retail IoT Cybersecurity Spend
    • Figure & Table 4.1: Retailer Annual Spend on IoT Cybersecurity ($m), Split by Key Regions 2018-2023
  • 4.3 Connected Commercial & Industrial Buildings IoT Cybersecurity Spend
    • Figure & Table 4.2: Annual Spend for Connected Commercial & Industrial Buildings Cybersecurity ($m), Split by 8 Key Regions 2018-2023
  • 4.4 Agriculture IoT Cybersecurity Spend
    • Figure & Table 4.3: Agricultural Annual Spend on IoT Cybersecurity ($m), Split by 8 Key Regions 2018-2023

5. Public Services IoT Cybersecurity Spend

  • 5.1 Introduction
  • 5.2 Smart Street Lighting Cybersecurity Spend
    • Figure & Table 5.1: Annual Spend for Smart Street Lighting Cybersecurity ($m), Split by 8 Key Regions 2018-2023
  • 5.3 Smart Energy Cybersecurity Spend
    • Figure & Table 5.2: Annual Spend on Smart Energy Cybersecurity ($m), Split by Key Regions 2018-2023
  • 5.4 Smart Traffic & Smart Parking Cybersecurity Spend
    • Figure & Table 5.3: Annual Spend on Smart Traffic & Parking Cybersecurity ($m), Split by 8 Key Regions 2018-2023
Back to Top