Global Markets for Security Technologies for the Internet of Things (IoT)
The global market for Internet of Things (IoT) security solutions reached nearly $3.7 billion in 2016, and it is expected to grow at a compound annual growth rate (CAGR) of 25.6% over the next five years to reach a market size of more than $11.4 billion by 2021.
Hardware-based solutions as a segment reached $2.8 billion in 2016 and should reach $8.1 billion by 2021, with a CAGR of 23.4%.
Software-based solutions as a segment reached $825 million in 2016 and $3.3 billion by 2021, with a CAGR of 32.0%.
Hardware-based solutions as a segment reached $2.8 billion in 2016 and should reach $8.1 billion by 2021, with a CAGR of 23.4%.
Software-based solutions as a segment reached $825 million in 2016 and $3.3 billion by 2021, with a CAGR of 32.0%.
CHAPTER 1 INTRODUCTION
Study Goals and Objectives
Reasons for Doing This Study
Scope of Report
Information Sources
Methodology
Geographic Breakdown
Analyst's Credentials
Related BCC Research Reports
CHAPTER 2 SUMMARY AND HIGHLIGHTS
CHAPTER 3 IOT SECURITY SOLUTIONS: TECHNOLOGY BACKGROUND
IoT Security Solutions: An Overview
Differences Among IoT Security, Cybersecurity and Enterprise IT Security
Cost-Benefit Considerations for Implementing Security Solutions
IoT Data Security Standards and Regulations
Current Standards for IoT Data Security
IEEE Standards
FIPS 140-2
Common Criteria EAL5+
IETF ACE
Open Trust Protocol
Application Authentication Standards: OAUTH 2.0
OAuth 2.0
OpenID Connect 1.0
Future Needs from IoT Security Standards
Technology Trends and Their Effects on IoT Security Solutions Market
Types of IoT Security Threats and Forms of Attack
Types of IoT Security Threats
Types of IoT Security Attacks
Recent IoT System Security Breach Events and DDoS Attacks
Botnets and Distributed Denial-of-Service Attacks (DDoS)
IoT Security Solution Framework
Typical Architecture of an IoT Security System
Hardware versus Software-based Security
IoT Security Considerations
Secure Boot
Implementing Secure Boot with TrustZone and a TEE
Session Authentication: Roots of Truth
Device and Data Authentication: Techniques and Standards
X.509 Certificate-based Device Authentication
Mutual Authentication
Multi-factor Authentication
Trusted Execution Environment
Levels for IoT Endpoint Identity Authentication
IoT Data Encryption: Techniques and Standards
Techniques Available for Data Encryption
Symmetric Encryption and Asymmetric Encryption
Advanced Encryption Standard
Elliptic curve Cryptography
Secure Hash Algorithm
Format Preserving Encryption
Self-encrypting Drives
Common Techniques for Attacks at the IoT Device Level
Simple Power Analysis and Differential Power Analysis Attack
Side Channel Attacks
DPA Attack Countermeasures
Public Key Infrastructure Model
Security at the Network Connectivity Layer
Securing Devices
Securing the Transport Network with GSM Encryption
Network Security Using GSM Connectivity
Securing IoT Solutions and Applications Through Different Techniques
Zero-day Testing and Threat Detection
Security, Management and Updating of Devices
CHAPTER 4 IOT SECURITY SOLUTIONS MARKET BACKGROUND
IoT Market
Different Users and Players in the IoT Security Market
Analyzing the IoT Security Market
Government Regulations
U.S.
Canada
European Union
General Data Protection Regulation by the European Union
Australia
Public and Private Partnerships on IoT Standard Development
Digital Security Develops a Qualified Security Standard for IoT Devices
Intel and NSF Cooperative Research Model
Cloud Security Alliance Mobile Working Group: IoT initiative
IEC 62443/ISA99, Industrial Automation and Control System Security Committee
GSMA IoT Security Guidelines Development
Industry Consortiums and Groups Working on Developing IoT Security Standards
Kantara Initiative
Global Platform's Internet of Things Task Force
Industrial Internet Consortium Working Group
Internet of Things Security Foundation
IoT Cybersecurity Alliance
Online Trust Alliance IoT Trustworthy Working Group
Open Connectivity Foundation Security Working Group
Securing Smart Cities
Trusted Computing Group
Market size for IoT security solutions
Factors Driving 2016 Market Growth
Industry Analysis: 2016 Top 10 IoT Security Solutions Market Players and Market Share
Intel's Contribution to the Market
Gemalto's Contribution to the Market
NXP Semiconductor’s Contribution to the Market
Cisco's Contribution to the Market
Analysis of the Acquisitions and Mergers Market
Qualcomm and NXP Semiconductors
SoftBank Group Corp. and ARM Holdings
Cypress Semiconductor and Broadcom's Wireless IoT Business Segment
WISeKey's Acquisition of Inside Secure's Secure IoT IC Business
Partnerships between IoT Security Solution Developers
GlobalSign and Intrinsic-ID Partnership
Device Authority and DigiCert
GlobalSign and Infineon
Analysis of Distribution Models
Role of Resellers and System Integrators
License-based Software as a Service Model
Start-up Activity
CHAPTER 5 MARKET SEGMENTATION BY DEVICE LAYER IOT SECURITY
Technology Overview for Device Layer Security
Techniques to Ensure a Trusted IoT Execution Cycle
Market Analysis for Device Layer IoT Security Solutions
Regional Market Analysis for Device-layer IoT Security Solutions
Market Analysis for Identity and Authorization Management Solutions
IAM IoT Needs Differing from Traditional IAM Security
Importance of Managing Identity for IoT Devices
GlobalSign IAM Easy Solution
Intel Identity Protection Technology
Forge Rock Identity Platform
Ping Identity
Market Analysis for Hardware-based Trust Environments
Market Analysis for Embedded Secure Elements
SIM as a Secure Element in IoT Mobile Devices
Market Solutions for IoT Embedded Secure Elements
Gemalto Cinterion Secure Element
STMicroelectronics STSAFE-A100 Secure Elements
Microchip (Atmel) CryptoAuthentication Chip
Safran
Market Analysis for Hardware Security Module-based Solutions
Market Solutions for IoT HSM
Gemalto SafeNet HSM
Thales nShield HSM
HPE Atalia HSM
Utimaco HSM
Market Analysis for Hardware-based Trust Environments
Trusted Execution Environment
Trusted Platform Module
ARM TrustZone Technology
Intel's Trusted Execution Technology
Market Solution for TEE, TPM and TrustZone technologies in IoT embedded devices
ARM CryptoCell 300 Family
NXP Semiconductor (Freescale) QorIQ Layerscape Processing Platforms Trust Architecture 3.0
STMicroelectronics STSAFE TPM
Intel Quark Microcontrollers D1000/D2000
NXP Semiconductor Kinetis Secure MCU (ARM Cortex TrustZone Technology)
Microchip (Atmel) TPM
Infineon OPTIGA TPM
Sequitur Labs: CoreTEE
Advanced Key Generation and Protection Technology: Physical Unclonable Functions
Intrinsic-ID for PUF Technology
Market Analysis for Data Encryption and Authentication Solutions
PKI solutions for IoT security
Challenges for PKI Solutions for IoT
Market Solutions for PKI, Data Encryption and Authentication Solutions
Symantec: High-Volume PKI Solution
Gemalto PKI, SafeNet Encryption and Cryptomanagement
HPE SecureData
Entrust Datacard Authority Security Manager
WISekey WISeTrustIoT
DigiCert PKI for IoT
GlobalSign
CHAPTER 6 MARKET SEGMENTATION: NETWORK LAYER IOT SECURITY
Technology Overview for IoT Network Technologies
Wireless Connectivity Solutions for IoT Devices
Wireless Local Area Network Technologies
Bluetooth Low Energy
ZigBee
Wi-Fi
Wide Area Network Technologies
LoRa WAN
SIGFOX
Nwave
Secured data transfer across mobile public networks with VPN
Messaging Protocols and Security Technologies
Data Distribution Service
CoAP
MQTT
TLS and SSL Security for Internet Data Connectivity
New solutions for IoT-specific TLS Security
Inside Secure MatrixSSL Tiny
Offspark PolarSSL
Cypherbridge uSSL
Security Technologies for IoT Network Security
Encryption of Data on the IoT Network
Authentication of Network Devices
Network Access Control and IPsec Protocol
Token-based access control
IoT Controller
Market Analysis for Network Level IoT Security Solutions
Regional Market for IoT Network Layer Security Solutions
Market Analysis for IoT Network Security Solution Providers and Their Market Shares
Market Solutions for IoT Network Connectivity Security Solutions
Cisco Network-based Security Solutions
NXP Semiconductors’ QorIQ LS1021A Processor
HPE RFProtect Wireless Intrusion Protection Solution
Inside Secure GUARD Secure Toolkit
Cypress Semiconductors (Broadcom) WICED Smart chips
Technology Overview for Firewalls and IoT Gateways
IoT Embedded and Network-based Firewalls
Network-based Firewall
Embedded Device Firewalls
IoT Gateways
Security Technologies for IoT Gateways
End-to-end Encryption
Future of IoT Gateways
Market Analysis for Network Firewalls and IoT Gateways Security Solutions
Market Solutions for IoT Gateways and Edge Firewalls as Security Solutions
Intel IoT Gateways
Fortinet Enterprise Firewall Solution
Cisco ASA NGFW Firewall and IoT Gateway
HPE Edgeline Intelligent Gateways
NXP Modular IoT Gateway-
CHAPTER 7 MARKET SEGMENTATION BY IOT APPLICATION AND CLOUD SECURITY
Technology Overview: IoT Application Security Technologies
CHAPTER 8 MARKET SEGMENTATION: THREAT DETECTION AND SECURITY MANAGEMENT SOLUTIONS
Technology Overview: Threat Detection Solutions
Security Lifecycle Management
Threat Detection and Deception Techniques
Deception-based Security Solutions
Attivo Networks ThreatMatrix Deception Platform
Sandbox Technique for Advanced Threat Detection
Market Analysis for Real-Time IoT Threat Detection and Security Management Solutions
CHAPTER 9 MARKET SEGMENTATION: END-TO-END IOT SECURITY PLATFORMS
IoT Security Platforms: Overview
IoT Security Fabric Different from IoT Security Platforms
Market Analysis for End-to-End IoT Security Platforms
Fortinet Security Fabric Network Security Solution
Intel IoT Security Platform
Trustonic Secured Platform
Mocana Security of Things Platform
Iconlabs’ Floodgate IoT Security Framework
WISekey CertifyID IoT Platform
CSS Verde TTO IoT Identity Platform
CENTRI IoTAS Platform
NXP QorIQ Layerscape Secure Platform
STMicroelectronics IoT Security Platform
Device Authority KeyScaler IoT Security Automation Platform
CHAPTER 10 MARKET SEGMENTATION: IOT SECURITY SOLUTIONS BY END-USE MARKETS
Market Analysis of End-use Applications of IoT Security Solutions
Security for the Industrial IoT
Smart Energy
Market Analysis for the Commercial Application of IoT Security Solutions
Automotive Industry
Mocana
NXP Semiconductors
Healthcare IoT Security Solutions
Gemalto
Thales e-Security
Smart Cities
Mocana
Market Analysis for Consumer Applications of IoT Security Solutions
Smart Homes
DigiCert's Security Solution for Smart Homes
Smart Wearables
WISekey Security for Smart Wearables
NXP Semiconductor Security for Smart Wearables
CHAPTER 11 MARKET SEGMENTATION BY REGION
Analysis of the Regional Markets
North American Market
U.S.
FTCs Guidelines on Best Practices for IoT Device Manufacturers within the U.S. Market
U.S. Department of Homeland Security Recommendation for IoT Security
Top IoT Security Solutions Market Players in the U.S.
Canada
South American Market
European Market
Germany
IBM's Headquarters in Munich for Watson Internet of Things
Siemens
Infineon Research Partnership ALESSIO to Develop New Security Mechanisms
Data Privacy Regulations in Germany
France
U.K.
Spain
Asia-Pacific Market
Japan
China
India
South Korea
Middle East and Africa Market
Israel
Saudi Arabia
South Africa
CHAPTER 12 APPLICATION OF SECURITY SOLUTIONS FOR IOT PLATFORMS
Market Analysis of Security Solutions Integrated into IoT Platforms
Market for IoT Security Solutions for IoT Platforms
Security Solutions for Application Enablement Platforms
PTC Thingworx
Cumulocity IoT Platform
Network Connectivity Management Platforms
Sierra Wireless AirVantage Connectivity Management IoT Platform
Ayla Networks Agile IoT Platform
Market Analysis for Security Solutions in Device Management IoT Platforms
Nokia MOTIVE Device Connectivity Management IoT Platform
Microchip Secured Zero Touch for AWS IoT Secure Device Provisioning Platform
Bosch IoT Device Management Platform
Microsoft Azure IoT Suite for Device Management
Secure Connectivity
Secure Processing and Storage in the Cloud
Exosite IoT Platform
Weave IoT Connectivity Platform for Consumer Devices
ARTIK Samsung IoT Platform
Intel Wind River Intelligent Device Platform
Electric Imp IoT Platform
ARM mbed IoT Device Platform
Market Analysis for Network Connectivity Management IoT Platforms
Cisco Control Center Platform
Ericsson Device Connection Platform
Ayla Networks Agile IoT Platform
CHAPTER 13 NEW TECHNOLOGY DEVELOPMENTS
New IoT Security Technologies
Software-defined Solutions
Bare Metal Security
Hypervisor Virtual Isolation
Blockchain
Runtime Application Self-Protection
Behavioral Biometrics
Quantum-resistant Security for the IoT
Advances in Cryptography Techniques
Future of IAM: Identity Relationship Management
CHAPTER 14 PATENT DEVELOPMENTS IN IOT SECURITY
Overview of Patents in the IoT Security Market
WISekey Patents
Device Authority
Tyfone Patents and Technology Brief
US8477940 Symmetric cryptography with user authentication
US8745709 Multifactor Authentication Service
9055029 TOKEN-BASED MULTIFACTOR AUTHENTICATION
Introspective Networks
CHAPTER 15 ANALYSIS OF MARKET OPPORTUNITIES
IoT Challenges
New IoT Device Layer Data Security Technologies as a Market Opportunity
New Application and Cloud Layer IoT Security Technologies as Market Opportunity
New Network-based Security Technologies as Market Opportunities
New Application and Cloud IoT Security Technologies as Market Opportunities
Cloud-based Solutions
IoT Platforms as Market Opportunities
Regional Market Opportunities
European Markets
Asia-Pacific Markets
North American Market
Investment Opportunities in Research and Innovation
CHAPTER 16 COMPANY PROFILES
AEROHIVE
ARXAN
ARM
ATMEL
BROADSTAR INFORMATION TECHNOLOGIES
CENTRI TECHNOLOGY
CERTIFIED SECURITY SOLUTIONS INC.
CISCO SYSTEMS INC.
DEVICE AUTHORITY
DIGICERT INC.
ENTRUST DATACARD
ESCRYPT
FIREEYE
FORESCOUT TECHNOLOGIES INC.
FORGEROCK
GEMALTO
GLOBALSIGN INC.
GREAT BAY SOFTWARE INC.
ICON LABS
IMAGINATION TECHNOLOGIES
INFINEON
INSIDE SECURE
INTRINSIC-ID
MDS TECHNOLOGY
MICROCHIP TECHNOLOGY INC.
MICROSOFT
MOCANA
NXP SEMICONDUCTORS
OBERTHUR TECHNOLOGIES
PROTEGRITY INC.
PROVE AND RUN
RENESAS
RUBICON LABS
SECURERF
SECURITHINGS LTD.
SEQUITUR LABS INC.
SUREPASSID
SYMANTEC
SYNOPSYS
THALES E-SECURITY INC.
TRILLIUM
TRUSTONIC
TYFONE
UTIMACO
WISEKEY SA
ZINGBOX INC.
CHAPTER 17 ABBREVIATIONS
Application Security Using Code Signing
Market Analysis of IoT Device Cloud Security Solutions
Leverage Standards-based Best Practices
PKI for Securing Cloud Applications
Role of Cloud Access Security Broker in Cloud Security
Market Analysis for IoT Application and Device Cloud Security Solutions
Market Share and Revenues for IoT Application Security Solutions
Gemalto SafeNet ProtectApp
Inside Secure Embedded IoT Security Toolkit and WhiteBox Solutions
Arxan Application Protection for IoT and Embedded Devices
Thales E Security CodeSafe Capabilities of the nShield HSMs
Market Share and Revenues for IoT Cloud Data Security Solutions
Market Solutions for Cloud-based Data Protection
Symantec Cloud Data Protection
Gemalto SafeNet Cloud Security
IBM Multi Cloud Data Encryption
Skyhigh Cloud Data Protection Solution
Thales Vormetric Cloud Encryption Gateway
Market Solutions for Threat Detection and Management
Webroot BrightCloud Threat Intelligence
ForeScout Technologies CounterACT Solution
SecuriThings
IBM Security Intelligence for Cognitive IoT
ZingBox IoT Guardian
Pwnie Express Pulse Solution
Study Goals and Objectives
Reasons for Doing This Study
Scope of Report
Information Sources
Methodology
Geographic Breakdown
Analyst's Credentials
Related BCC Research Reports
CHAPTER 2 SUMMARY AND HIGHLIGHTS
CHAPTER 3 IOT SECURITY SOLUTIONS: TECHNOLOGY BACKGROUND
IoT Security Solutions: An Overview
Differences Among IoT Security, Cybersecurity and Enterprise IT Security
Cost-Benefit Considerations for Implementing Security Solutions
IoT Data Security Standards and Regulations
Current Standards for IoT Data Security
IEEE Standards
FIPS 140-2
Common Criteria EAL5+
IETF ACE
Open Trust Protocol
Application Authentication Standards: OAUTH 2.0
OAuth 2.0
OpenID Connect 1.0
Future Needs from IoT Security Standards
Technology Trends and Their Effects on IoT Security Solutions Market
Types of IoT Security Threats and Forms of Attack
Types of IoT Security Threats
Types of IoT Security Attacks
Recent IoT System Security Breach Events and DDoS Attacks
Botnets and Distributed Denial-of-Service Attacks (DDoS)
IoT Security Solution Framework
Typical Architecture of an IoT Security System
Hardware versus Software-based Security
IoT Security Considerations
Secure Boot
Implementing Secure Boot with TrustZone and a TEE
Session Authentication: Roots of Truth
Device and Data Authentication: Techniques and Standards
X.509 Certificate-based Device Authentication
Mutual Authentication
Multi-factor Authentication
Trusted Execution Environment
Levels for IoT Endpoint Identity Authentication
IoT Data Encryption: Techniques and Standards
Techniques Available for Data Encryption
Symmetric Encryption and Asymmetric Encryption
Advanced Encryption Standard
Elliptic curve Cryptography
Secure Hash Algorithm
Format Preserving Encryption
Self-encrypting Drives
Common Techniques for Attacks at the IoT Device Level
Simple Power Analysis and Differential Power Analysis Attack
Side Channel Attacks
DPA Attack Countermeasures
Public Key Infrastructure Model
Security at the Network Connectivity Layer
Securing Devices
Securing the Transport Network with GSM Encryption
Network Security Using GSM Connectivity
Securing IoT Solutions and Applications Through Different Techniques
Zero-day Testing and Threat Detection
Security, Management and Updating of Devices
CHAPTER 4 IOT SECURITY SOLUTIONS MARKET BACKGROUND
IoT Market
Different Users and Players in the IoT Security Market
Analyzing the IoT Security Market
Government Regulations
U.S.
Canada
European Union
General Data Protection Regulation by the European Union
Australia
Public and Private Partnerships on IoT Standard Development
Digital Security Develops a Qualified Security Standard for IoT Devices
Intel and NSF Cooperative Research Model
Cloud Security Alliance Mobile Working Group: IoT initiative
IEC 62443/ISA99, Industrial Automation and Control System Security Committee
GSMA IoT Security Guidelines Development
Industry Consortiums and Groups Working on Developing IoT Security Standards
Kantara Initiative
Global Platform's Internet of Things Task Force
Industrial Internet Consortium Working Group
Internet of Things Security Foundation
IoT Cybersecurity Alliance
Online Trust Alliance IoT Trustworthy Working Group
Open Connectivity Foundation Security Working Group
Securing Smart Cities
Trusted Computing Group
Market size for IoT security solutions
Factors Driving 2016 Market Growth
Industry Analysis: 2016 Top 10 IoT Security Solutions Market Players and Market Share
Intel's Contribution to the Market
Gemalto's Contribution to the Market
NXP Semiconductor’s Contribution to the Market
Cisco's Contribution to the Market
Analysis of the Acquisitions and Mergers Market
Qualcomm and NXP Semiconductors
SoftBank Group Corp. and ARM Holdings
Cypress Semiconductor and Broadcom's Wireless IoT Business Segment
WISeKey's Acquisition of Inside Secure's Secure IoT IC Business
Partnerships between IoT Security Solution Developers
GlobalSign and Intrinsic-ID Partnership
Device Authority and DigiCert
GlobalSign and Infineon
Analysis of Distribution Models
Role of Resellers and System Integrators
License-based Software as a Service Model
Start-up Activity
CHAPTER 5 MARKET SEGMENTATION BY DEVICE LAYER IOT SECURITY
Technology Overview for Device Layer Security
Techniques to Ensure a Trusted IoT Execution Cycle
Market Analysis for Device Layer IoT Security Solutions
Regional Market Analysis for Device-layer IoT Security Solutions
Market Analysis for Identity and Authorization Management Solutions
IAM IoT Needs Differing from Traditional IAM Security
Importance of Managing Identity for IoT Devices
GlobalSign IAM Easy Solution
Intel Identity Protection Technology
Forge Rock Identity Platform
Ping Identity
Market Analysis for Hardware-based Trust Environments
Market Analysis for Embedded Secure Elements
SIM as a Secure Element in IoT Mobile Devices
Market Solutions for IoT Embedded Secure Elements
Gemalto Cinterion Secure Element
STMicroelectronics STSAFE-A100 Secure Elements
Microchip (Atmel) CryptoAuthentication Chip
Safran
Market Analysis for Hardware Security Module-based Solutions
Market Solutions for IoT HSM
Gemalto SafeNet HSM
Thales nShield HSM
HPE Atalia HSM
Utimaco HSM
Market Analysis for Hardware-based Trust Environments
Trusted Execution Environment
Trusted Platform Module
ARM TrustZone Technology
Intel's Trusted Execution Technology
Market Solution for TEE, TPM and TrustZone technologies in IoT embedded devices
ARM CryptoCell 300 Family
NXP Semiconductor (Freescale) QorIQ Layerscape Processing Platforms Trust Architecture 3.0
STMicroelectronics STSAFE TPM
Intel Quark Microcontrollers D1000/D2000
NXP Semiconductor Kinetis Secure MCU (ARM Cortex TrustZone Technology)
Microchip (Atmel) TPM
Infineon OPTIGA TPM
Sequitur Labs: CoreTEE
Advanced Key Generation and Protection Technology: Physical Unclonable Functions
Intrinsic-ID for PUF Technology
Market Analysis for Data Encryption and Authentication Solutions
PKI solutions for IoT security
Challenges for PKI Solutions for IoT
Market Solutions for PKI, Data Encryption and Authentication Solutions
Symantec: High-Volume PKI Solution
Gemalto PKI, SafeNet Encryption and Cryptomanagement
HPE SecureData
Entrust Datacard Authority Security Manager
WISekey WISeTrustIoT
DigiCert PKI for IoT
GlobalSign
CHAPTER 6 MARKET SEGMENTATION: NETWORK LAYER IOT SECURITY
Technology Overview for IoT Network Technologies
Wireless Connectivity Solutions for IoT Devices
Wireless Local Area Network Technologies
Bluetooth Low Energy
ZigBee
Wi-Fi
Wide Area Network Technologies
LoRa WAN
SIGFOX
Nwave
Secured data transfer across mobile public networks with VPN
Messaging Protocols and Security Technologies
Data Distribution Service
CoAP
MQTT
TLS and SSL Security for Internet Data Connectivity
New solutions for IoT-specific TLS Security
Inside Secure MatrixSSL Tiny
Offspark PolarSSL
Cypherbridge uSSL
Security Technologies for IoT Network Security
Encryption of Data on the IoT Network
Authentication of Network Devices
Network Access Control and IPsec Protocol
Token-based access control
IoT Controller
Market Analysis for Network Level IoT Security Solutions
Regional Market for IoT Network Layer Security Solutions
Market Analysis for IoT Network Security Solution Providers and Their Market Shares
Market Solutions for IoT Network Connectivity Security Solutions
Cisco Network-based Security Solutions
NXP Semiconductors’ QorIQ LS1021A Processor
HPE RFProtect Wireless Intrusion Protection Solution
Inside Secure GUARD Secure Toolkit
Cypress Semiconductors (Broadcom) WICED Smart chips
Technology Overview for Firewalls and IoT Gateways
IoT Embedded and Network-based Firewalls
Network-based Firewall
Embedded Device Firewalls
IoT Gateways
Security Technologies for IoT Gateways
End-to-end Encryption
Future of IoT Gateways
Market Analysis for Network Firewalls and IoT Gateways Security Solutions
Market Solutions for IoT Gateways and Edge Firewalls as Security Solutions
Intel IoT Gateways
Fortinet Enterprise Firewall Solution
Cisco ASA NGFW Firewall and IoT Gateway
HPE Edgeline Intelligent Gateways
NXP Modular IoT Gateway-
CHAPTER 7 MARKET SEGMENTATION BY IOT APPLICATION AND CLOUD SECURITY
Technology Overview: IoT Application Security Technologies
CHAPTER 8 MARKET SEGMENTATION: THREAT DETECTION AND SECURITY MANAGEMENT SOLUTIONS
Technology Overview: Threat Detection Solutions
Security Lifecycle Management
Threat Detection and Deception Techniques
Deception-based Security Solutions
Attivo Networks ThreatMatrix Deception Platform
Sandbox Technique for Advanced Threat Detection
Market Analysis for Real-Time IoT Threat Detection and Security Management Solutions
CHAPTER 9 MARKET SEGMENTATION: END-TO-END IOT SECURITY PLATFORMS
IoT Security Platforms: Overview
IoT Security Fabric Different from IoT Security Platforms
Market Analysis for End-to-End IoT Security Platforms
Fortinet Security Fabric Network Security Solution
Intel IoT Security Platform
Trustonic Secured Platform
Mocana Security of Things Platform
Iconlabs’ Floodgate IoT Security Framework
WISekey CertifyID IoT Platform
CSS Verde TTO IoT Identity Platform
CENTRI IoTAS Platform
NXP QorIQ Layerscape Secure Platform
STMicroelectronics IoT Security Platform
Device Authority KeyScaler IoT Security Automation Platform
CHAPTER 10 MARKET SEGMENTATION: IOT SECURITY SOLUTIONS BY END-USE MARKETS
Market Analysis of End-use Applications of IoT Security Solutions
Security for the Industrial IoT
Smart Energy
Market Analysis for the Commercial Application of IoT Security Solutions
Automotive Industry
Mocana
NXP Semiconductors
Healthcare IoT Security Solutions
Gemalto
Thales e-Security
Smart Cities
Mocana
Market Analysis for Consumer Applications of IoT Security Solutions
Smart Homes
DigiCert's Security Solution for Smart Homes
Smart Wearables
WISekey Security for Smart Wearables
NXP Semiconductor Security for Smart Wearables
CHAPTER 11 MARKET SEGMENTATION BY REGION
Analysis of the Regional Markets
North American Market
U.S.
FTCs Guidelines on Best Practices for IoT Device Manufacturers within the U.S. Market
U.S. Department of Homeland Security Recommendation for IoT Security
Top IoT Security Solutions Market Players in the U.S.
Canada
South American Market
European Market
Germany
IBM's Headquarters in Munich for Watson Internet of Things
Siemens
Infineon Research Partnership ALESSIO to Develop New Security Mechanisms
Data Privacy Regulations in Germany
France
U.K.
Spain
Asia-Pacific Market
Japan
China
India
South Korea
Middle East and Africa Market
Israel
Saudi Arabia
South Africa
CHAPTER 12 APPLICATION OF SECURITY SOLUTIONS FOR IOT PLATFORMS
Market Analysis of Security Solutions Integrated into IoT Platforms
Market for IoT Security Solutions for IoT Platforms
Security Solutions for Application Enablement Platforms
PTC Thingworx
Cumulocity IoT Platform
Network Connectivity Management Platforms
Sierra Wireless AirVantage Connectivity Management IoT Platform
Ayla Networks Agile IoT Platform
Market Analysis for Security Solutions in Device Management IoT Platforms
Nokia MOTIVE Device Connectivity Management IoT Platform
Microchip Secured Zero Touch for AWS IoT Secure Device Provisioning Platform
Bosch IoT Device Management Platform
Microsoft Azure IoT Suite for Device Management
Secure Connectivity
Secure Processing and Storage in the Cloud
Exosite IoT Platform
Weave IoT Connectivity Platform for Consumer Devices
ARTIK Samsung IoT Platform
Intel Wind River Intelligent Device Platform
Electric Imp IoT Platform
ARM mbed IoT Device Platform
Market Analysis for Network Connectivity Management IoT Platforms
Cisco Control Center Platform
Ericsson Device Connection Platform
Ayla Networks Agile IoT Platform
CHAPTER 13 NEW TECHNOLOGY DEVELOPMENTS
New IoT Security Technologies
Software-defined Solutions
Bare Metal Security
Hypervisor Virtual Isolation
Blockchain
Runtime Application Self-Protection
Behavioral Biometrics
Quantum-resistant Security for the IoT
Advances in Cryptography Techniques
Future of IAM: Identity Relationship Management
CHAPTER 14 PATENT DEVELOPMENTS IN IOT SECURITY
Overview of Patents in the IoT Security Market
WISekey Patents
Device Authority
Tyfone Patents and Technology Brief
US8477940 Symmetric cryptography with user authentication
US8745709 Multifactor Authentication Service
9055029 TOKEN-BASED MULTIFACTOR AUTHENTICATION
Introspective Networks
CHAPTER 15 ANALYSIS OF MARKET OPPORTUNITIES
IoT Challenges
New IoT Device Layer Data Security Technologies as a Market Opportunity
New Application and Cloud Layer IoT Security Technologies as Market Opportunity
New Network-based Security Technologies as Market Opportunities
New Application and Cloud IoT Security Technologies as Market Opportunities
Cloud-based Solutions
IoT Platforms as Market Opportunities
Regional Market Opportunities
European Markets
Asia-Pacific Markets
North American Market
Investment Opportunities in Research and Innovation
CHAPTER 16 COMPANY PROFILES
AEROHIVE
ARXAN
ARM
ATMEL
BROADSTAR INFORMATION TECHNOLOGIES
CENTRI TECHNOLOGY
CERTIFIED SECURITY SOLUTIONS INC.
CISCO SYSTEMS INC.
DEVICE AUTHORITY
DIGICERT INC.
ENTRUST DATACARD
ESCRYPT
FIREEYE
FORESCOUT TECHNOLOGIES INC.
FORGEROCK
GEMALTO
GLOBALSIGN INC.
GREAT BAY SOFTWARE INC.
ICON LABS
IMAGINATION TECHNOLOGIES
INFINEON
INSIDE SECURE
INTRINSIC-ID
MDS TECHNOLOGY
MICROCHIP TECHNOLOGY INC.
MICROSOFT
MOCANA
NXP SEMICONDUCTORS
OBERTHUR TECHNOLOGIES
PROTEGRITY INC.
PROVE AND RUN
RENESAS
RUBICON LABS
SECURERF
SECURITHINGS LTD.
SEQUITUR LABS INC.
SUREPASSID
SYMANTEC
SYNOPSYS
THALES E-SECURITY INC.
TRILLIUM
TRUSTONIC
TYFONE
UTIMACO
WISEKEY SA
ZINGBOX INC.
CHAPTER 17 ABBREVIATIONS
Application Security Using Code Signing
Market Analysis of IoT Device Cloud Security Solutions
Leverage Standards-based Best Practices
PKI for Securing Cloud Applications
Role of Cloud Access Security Broker in Cloud Security
Market Analysis for IoT Application and Device Cloud Security Solutions
Market Share and Revenues for IoT Application Security Solutions
Gemalto SafeNet ProtectApp
Inside Secure Embedded IoT Security Toolkit and WhiteBox Solutions
Arxan Application Protection for IoT and Embedded Devices
Thales E Security CodeSafe Capabilities of the nShield HSMs
Market Share and Revenues for IoT Cloud Data Security Solutions
Market Solutions for Cloud-based Data Protection
Symantec Cloud Data Protection
Gemalto SafeNet Cloud Security
IBM Multi Cloud Data Encryption
Skyhigh Cloud Data Protection Solution
Thales Vormetric Cloud Encryption Gateway
Market Solutions for Threat Detection and Management
Webroot BrightCloud Threat Intelligence
ForeScout Technologies CounterACT Solution
SecuriThings
IBM Security Intelligence for Cognitive IoT
ZingBox IoT Guardian
Pwnie Express Pulse Solution
LIST OF TABLES
Summary Table Global Market for IoT Security by Hardware and Software, Through 2021
Table 1 Key Technology Trends in the IoT Security Solutions Segment
Table 2 Global Market for IoT Solutions, by Different End Users, Through 2016
Table 3 Global Market for IoT Security Solutions, by Type of Solution, Through 2021
Table 4 Key Market Trends in the IoT Security Solutions Segment
Table 5 Global Market Share and Revenues for Top 10 IoT Security Solutions Providers, 2016
Table 6 Key Acquisitions and Mergers in the IoT Security Solutions Market, 2009-2016
Table 7 Key Partnerships in the IoT Security Solutions Market
Table 8 Global IoT Solutions Start-up Activity Market, by Region, 2016 and 2021
Table 9 Global Market for IoT Device Level Security Solutions, by End User, Through 2021
Table 10 Global Market for Device Level IoT Security Solutions, by Region, Through 2021
Table 11 Global Market Share and Revenues for Device Level IoT Security Solutions, by Identity and Access Management Technology, 2016
Table 12 Global Market for IoT Device Level Security Solutions, Through 2021
Table 13 Global Market Share and Revenues for IoT Device Level Security Solutions, by Embedded Secure Elements Technology, 2016,
Table 14 Global Market Share and Revenues for IoT Device Level Security, by HSM Technology, 2016
Table 15 Global Market Share and Revenues for Hardware-based Trust Environments, 2016
Table 16 Global Market Share and Revenues for Device Level IoT Security by Data Encryption and Authentication Solution Vendors, 2016
Table 17 Global Market for Network Level IoT Security Solutions, 2015-2021 (
Table 18 Global Market for Network Level IoT Security Solutions, by Region, Through 2021
Table 19 Global Market Share and Revenues for Network Level Security Solutions, 2016
Table 20 Global Market Share and Revenues for IoT Gateway and Firewall Security Solutions, 2016
Table 21 Global Market for IoT Applications and Cloud Security Solutions, Through 2021
Table 22 Global Market Share and Revenues for IoT Application Security Solutions, by Provider, 2016
Table 23 Global Market Share and Revenues for IoT-Based Cloud Data Security Solutions, 2016
Table 24 Global Market Share and Revenues for IoT Threat Detection and Security Management Solutions, by Solution Provider, 2016
Table 25 Global Market for IoT Security Platforms, by Segment, Through 2021
Table 26 Global Market Share and Revenues for End-to-End IoT Security Platforms, by Provider, 2016
Table 27 Global Market for IoT Security Solutions by End-User Segment, Through 2021
Table 28 Global Market for IoT Security Solutions by Region, Through 2021
Table 29 North American Market for IoT Security Solutions, by Country, 2016
Table 30 South American Market for IoT Security Solutions, by Country, 2016
Table 31 European Market for IoT Security Solutions, by Country, 2016
Table 32 Asia-Pacific Market IoT Security Solutions, by Country, 2016
Table 33 Middle East and Africa Market for IoT Security Solutions, by Country, 2016
Table 34 Global Market for IoT Security Solutions for IoT Platforms, by End-User Segments, Through 2021
Table 35 Abbreviations Used in the IoT Security Solutions Market Report
Summary Table Global Market for IoT Security by Hardware and Software, Through 2021
Table 1 Key Technology Trends in the IoT Security Solutions Segment
Table 2 Global Market for IoT Solutions, by Different End Users, Through 2016
Table 3 Global Market for IoT Security Solutions, by Type of Solution, Through 2021
Table 4 Key Market Trends in the IoT Security Solutions Segment
Table 5 Global Market Share and Revenues for Top 10 IoT Security Solutions Providers, 2016
Table 6 Key Acquisitions and Mergers in the IoT Security Solutions Market, 2009-2016
Table 7 Key Partnerships in the IoT Security Solutions Market
Table 8 Global IoT Solutions Start-up Activity Market, by Region, 2016 and 2021
Table 9 Global Market for IoT Device Level Security Solutions, by End User, Through 2021
Table 10 Global Market for Device Level IoT Security Solutions, by Region, Through 2021
Table 11 Global Market Share and Revenues for Device Level IoT Security Solutions, by Identity and Access Management Technology, 2016
Table 12 Global Market for IoT Device Level Security Solutions, Through 2021
Table 13 Global Market Share and Revenues for IoT Device Level Security Solutions, by Embedded Secure Elements Technology, 2016,
Table 14 Global Market Share and Revenues for IoT Device Level Security, by HSM Technology, 2016
Table 15 Global Market Share and Revenues for Hardware-based Trust Environments, 2016
Table 16 Global Market Share and Revenues for Device Level IoT Security by Data Encryption and Authentication Solution Vendors, 2016
Table 17 Global Market for Network Level IoT Security Solutions, 2015-2021 (
Table 18 Global Market for Network Level IoT Security Solutions, by Region, Through 2021
Table 19 Global Market Share and Revenues for Network Level Security Solutions, 2016
Table 20 Global Market Share and Revenues for IoT Gateway and Firewall Security Solutions, 2016
Table 21 Global Market for IoT Applications and Cloud Security Solutions, Through 2021
Table 22 Global Market Share and Revenues for IoT Application Security Solutions, by Provider, 2016
Table 23 Global Market Share and Revenues for IoT-Based Cloud Data Security Solutions, 2016
Table 24 Global Market Share and Revenues for IoT Threat Detection and Security Management Solutions, by Solution Provider, 2016
Table 25 Global Market for IoT Security Platforms, by Segment, Through 2021
Table 26 Global Market Share and Revenues for End-to-End IoT Security Platforms, by Provider, 2016
Table 27 Global Market for IoT Security Solutions by End-User Segment, Through 2021
Table 28 Global Market for IoT Security Solutions by Region, Through 2021
Table 29 North American Market for IoT Security Solutions, by Country, 2016
Table 30 South American Market for IoT Security Solutions, by Country, 2016
Table 31 European Market for IoT Security Solutions, by Country, 2016
Table 32 Asia-Pacific Market IoT Security Solutions, by Country, 2016
Table 33 Middle East and Africa Market for IoT Security Solutions, by Country, 2016
Table 34 Global Market for IoT Security Solutions for IoT Platforms, by End-User Segments, Through 2021
Table 35 Abbreviations Used in the IoT Security Solutions Market Report
LIST OF FIGURES
Summary Figure Global Market for IoT security by Type of Solution, 2015-2021
Figure 1 Typical Architecture for IoT Systems and Security Layers
Figure 2 Global Market for IoT Solutions, by Different End Users, 2016-2022
Figure 3 Global Market for IoT Security Solutions, by Type of Solution, 2015-2021
Figure 4 Global Market Share for Device-Level IoT Security Solutions by Identity and Access Management Technology, 2016
Figure 5 Global IoT Security Solutions Start-up Activity Market Share, by Region, 2016
Figure 6 Global Market for IoT Device Level Security Solutions, by End User, 2015-2021
Figure 7 Global Markets for Device Level IoT Security Solutions, by Region, 2016
Figure 8 Global Market Share for Device Layer IoT Security, by Identity and Access Management Solutions, 2016
Figure 9 Global Market for Report Topic, by Technology Type, 2014-2021
Figure 10 Global Market Share and Revenues for IoT Device Level Security Solutions, by Embedded Secure Elements Technology, 2016
Figure 11 Global Market Share for IoT Device Level Security, by HSM Technology, 2016
Figure 12 Global Market Share for Hardware-based Trust Environments, 2016
Figure 13 Global Market Share for IoT Device Level Security by Data Encryption and Authentication Solution Vendors, 2016
Figure 14 Global Market for Network Layer IoT Security Solutions, 2015-2021
Figure 15 Global Market for Network Layer IoT Security Solutions by Region, 2015-2021
Figure 16 Global Market Share for Network Level Security Solutions, by Vendor, 2014-2021
Figure 17 Global Market Share for IoT Gateway and Firewall Security Solutions, 2016
Figure 18 Global Market for IoT Application and Cloud Security Solutions, 2015-2021
Figure 19 Global Market Share for IoT Application Security Solutions, by Provider, 2016
Figure 20 Global Market Share for IoT-Based Cloud Data Security Solutions, 2016
Figure 21 Global Market Share for IoT Threat Detection and Security Management Solutions, by Solution Provider, 2014-2021
Figure 22 Global Market for IoT Security Platforms, by Segment, 2015-2021
Figure 23 Global Market Share for End-to-end IoT Security Platforms, by Provider, 2016
Figure 24 Global Market for IoT Security Solutions by End User Segment, 2015-2021
Figure 25 Global Market for IoT Security Solutions by Region, 2015-2021
Figure 26 North American Market for IoT Security Solutions, by Country, 2016
Figure 27 South American Market for IoT Security Solutions, by Country, 2016
Figure 28 European Market for IoT Security Solutions, by Country, 2016
Figure 29 Asia-Pacific Market IoT Security Solutions, by Country, 2016
Figure 30 Middle East and Africa Market for IoT Security Solutions, by Country, 2016
Figure 31 Global Market for Security Solutions for IoT Platforms, by End-User Segments, 2016
Summary Figure Global Market for IoT security by Type of Solution, 2015-2021
Figure 1 Typical Architecture for IoT Systems and Security Layers
Figure 2 Global Market for IoT Solutions, by Different End Users, 2016-2022
Figure 3 Global Market for IoT Security Solutions, by Type of Solution, 2015-2021
Figure 4 Global Market Share for Device-Level IoT Security Solutions by Identity and Access Management Technology, 2016
Figure 5 Global IoT Security Solutions Start-up Activity Market Share, by Region, 2016
Figure 6 Global Market for IoT Device Level Security Solutions, by End User, 2015-2021
Figure 7 Global Markets for Device Level IoT Security Solutions, by Region, 2016
Figure 8 Global Market Share for Device Layer IoT Security, by Identity and Access Management Solutions, 2016
Figure 9 Global Market for Report Topic, by Technology Type, 2014-2021
Figure 10 Global Market Share and Revenues for IoT Device Level Security Solutions, by Embedded Secure Elements Technology, 2016
Figure 11 Global Market Share for IoT Device Level Security, by HSM Technology, 2016
Figure 12 Global Market Share for Hardware-based Trust Environments, 2016
Figure 13 Global Market Share for IoT Device Level Security by Data Encryption and Authentication Solution Vendors, 2016
Figure 14 Global Market for Network Layer IoT Security Solutions, 2015-2021
Figure 15 Global Market for Network Layer IoT Security Solutions by Region, 2015-2021
Figure 16 Global Market Share for Network Level Security Solutions, by Vendor, 2014-2021
Figure 17 Global Market Share for IoT Gateway and Firewall Security Solutions, 2016
Figure 18 Global Market for IoT Application and Cloud Security Solutions, 2015-2021
Figure 19 Global Market Share for IoT Application Security Solutions, by Provider, 2016
Figure 20 Global Market Share for IoT-Based Cloud Data Security Solutions, 2016
Figure 21 Global Market Share for IoT Threat Detection and Security Management Solutions, by Solution Provider, 2014-2021
Figure 22 Global Market for IoT Security Platforms, by Segment, 2015-2021
Figure 23 Global Market Share for End-to-end IoT Security Platforms, by Provider, 2016
Figure 24 Global Market for IoT Security Solutions by End User Segment, 2015-2021
Figure 25 Global Market for IoT Security Solutions by Region, 2015-2021
Figure 26 North American Market for IoT Security Solutions, by Country, 2016
Figure 27 South American Market for IoT Security Solutions, by Country, 2016
Figure 28 European Market for IoT Security Solutions, by Country, 2016
Figure 29 Asia-Pacific Market IoT Security Solutions, by Country, 2016
Figure 30 Middle East and Africa Market for IoT Security Solutions, by Country, 2016
Figure 31 Global Market for Security Solutions for IoT Platforms, by End-User Segments, 2016