Cover Image
Market Research Report

The Global Market for Automotive Cybersecurity: Protecting the Connected Vehicle from Inside & Out

Published by VDC Research Group, Inc. Product code 348571
Published Content info 25 Pages; 10 Exhibits
Delivery time: 1-2 business days
Price
Back to Top
The Global Market for Automotive Cybersecurity: Protecting the Connected Vehicle from Inside & Out
Published: May 31, 2019 Content info: 25 Pages; 10 Exhibits
Description

Automotive cybersecurity solutions addressed in this report include software, security-as-a-service, and professional services. Specific solutions include in-vehicle and cloud-based intrusion detection and prevention; public key infrastructure and encryption technologies for security of vehicle-to-vehicle and vehicle-to-infrastructure communications as well as supply chain integrity; secure firmware-over-the-air updating; and keyless virtual car keys. We also present relevant findings from a VDC Research survey of embedded engineers and software developers.

WHAT QUESTIONS ARE ADDRESSED?

  • How large is the market for automotive cybersecurity software and services, how fast is it growing, and
  • what factors are driving such growth?
  • What vendors offer which types of solutions, and who are the leading vendors?
  • How does the automotive industry's tiered supply chain impact cybersecurity?
  • How does adoption of cybersecurity in the automotive market compare to the rest of IoT?

VENDORS MENTIONED IN THIS REPORT:

  • Arilou
  • Atos
  • AVL Software & Functions
  • Battelle
  • BlackBerry (including Certicom,
  • Cylance, and QNX)
  • Bosch/ETAS (including ESCRYPT
  • and TrustPoint)
  • BT Security
  • C2A Security
  • Capricode
  • Continental (including Argus
  • Cyber Security and Elektrobit)
  • Covisint
  • Cybellum
  • DENSO
  • DigiCert
  • Enigmatos
  • Garrett Motion
  • Gemalto (Thales Digital Identity & Security)
  • Giesecke+Devrient
  • GMV
  • Green Hills Software (including
  • INTEGRITY Security Services)
  • GuardKnox
  • Horiba Mira
  • HARMAN (including TowerSec)
  • Intertrust
  • Irdeto
  • Karamba Security
  • Kaspersky Lab
  • Keyfactor
  • Lear
  • Luxoft
  • Mitsubishi Electric
  • Movimento (Aptiv)
  • OnBoard Security (Qualcomm)
  • Panasonic
  • Penta Security
  • Red Balloon Security
  • SafeRide Technologies
  • Sectigo (formerly Comodo CA)
  • secunet
  • Symantec
  • Trend Micro
  • Trillium Secure
  • TrustCentral
  • Trustonic
  • UL
  • Upstream Security
  • Vector Informatik
  • WISeKey
Table of Contents

Table of Contents

  • Executive Summary
  • Key Findings
  • Introduction: Connectivity Forces Security
    • Automotive In-Vehicle Systems
    • Security Implications of Tiered Supply Chain
  • Automotive Cybersecurity Categories
  • Global Market Overview
  • Regional Share
  • Engineer & Developer Insights
  • Vendor Landscape
    • Leading Vendor Ranking
  • Selected Vendor Notes
  • Appendix and Definitions
  • About VDC Research

List of Exhibits

  • Exhibit 1: Worldwide Percentage of New Cars and Light Trucks Equipped with Cellular Connectivity
  • Exhibit 2: Worldwide Installed Base of Cars and Light Trucks Equipped with Cellular Connectivity
  • Exhibit 3: Sample Table of Vendors Offering Automotive Cybersecurity Solutions
  • Exhibit 4: Worldwide Revenues from Automotive Cybersecurity Software and Services, 2018 to 2023
  • Exhibit 5: Worldwide Revenue Share for Automotive Cybersecurity Software and Services, 2018 to 2023, By Category
  • Exhibit 6: Worldwide Revenue Share for Automotive Cybersecurity Software and Services, 2018 & 2023, By Geographic Region
  • Exhibit 7: Worldwide Revenue for Automotive Cybersecurity Software and Services, by Geographic Region 2018 to 2023
  • Exhibit 8: Survey: Use of Embedded Security Software, Hardware, Firmware-Over-the-Air Updating, and PKI in Current Automotive Projects vs. Overall IoT Projects
  • Exhibit 9: Survey: Expected Use of Embedded Security Software, Hardware, and Firmware-Over-the-Air Updating in 3 Years Future Automotive Projects vs. Overall IoT Projects
  • Exhibit 10: Survey: Organization Added Staff Specifically in Response to Security Requirements
Back to Top