[email protected] +44 20 8123 2220 (UK) +1 732 587 5005 (US) Contact Us | FAQ |

Artificial Intelligence in IoT Security and Fraud Prevention 2017 - 2022

March 2017 | 87 pages | ID: A0CFD3F42DEEN
Mind Commerce Publishing LLC

US$ 995.00

E-mail Delivery (PDF)

Download PDF Leaflet

Accepted cards
Wire Transfer
Checkout Later
Need Help? Ask a Question
OVERVIEW:

Artificial Intelligence (AI) is rapidly becoming integrated into many aspects of communication, applications, content, and commerce. The Internet of Things (IoT) is a particularly important area for AI as a means for safeguarding assets, reducing fraud, and supporting analytics and automated decision making. One of the major concerns is illegal capture and trade of IoT data which includes users’ activities and records such as personal health, financial information, location, and asset information such as personal vehicles.

This report evaluates that technologies, market opportunities, and outlook for AI-based security in IoT. The report includes analysis of AI in specific IoT deployment scenarios such as Fog Computing architectures. The report provides forecasting for 2017 to 2022. All purchases of Mind Commerce reports includes time with an expert analyst who will help you link key findings in the report to the business issues you're addressing. This needs to be used within three months of purchasing the report.

TARGET AUDIENCE:
  • AI companies
  • Security companies
  • Wireless device manufacturers
  • Telephony infrastructure providers
  • Computer and semiconductor companies
  • Embedded hardware, software and OS providers
  • Wireless network operators and service providers
1 INTRODUCTION

1.1 Scope of Study
1.2 Target Audience
1.3 Companies in Report

2 EXECUTIVE SUMMARY

3 OVERVIEW

3.1 Cyber Security
3.2 Ramification of Cyber Security Threats
3.3 Internet of Things
3.4 General IoT Security Concerns
3.5 IoT Security Focus Areas
3.6 Distributed IoT: Fog Computing
  3.6.1 Edge Computing
  3.6.2 Edge Computing vs. Cluster Computing
  3.6.3 Mobile Edge Computing
  3.6.4 Fog Computing
  3.6.5 Cloud Computing vs. Fog Computing
3.7 Specific Security Concerns with Fog Computing

4 SECURITY SOLUTIONS IN IOT

4.1 Challenges in Developing Security Solutions for IoT
  4.1.1 Multivendor Nature of IoT Business
  4.1.2 Lack of Standard Security Practices
  4.1.3 Existing IoT Devices lack Robust Security
  4.1.4 Security Threats are becoming Increasingly Sophisticated
  4.1.5 IoT Data is a Bigger Concern than Equipment
4.2 Solution Areas for Securing IoT
4.3 General Steps to Secure IoT
  4.3.1 Securing Device
  4.3.2 Using Secure Communication Protocols
  4.3.3 Securing and Protecting Data
4.4 General IoT Security Measures
  4.4.1 Convergence of IT and OT Security Policies
  4.4.2 Securing Mobile Devices and Applications
  4.4.3 Securing IoT Cloud Infrastructure
4.5 IoT Security Issues that Drive the Need for AI
  4.5.1 Fog Computing Security Concerns: An Evolving Issue
  4.5.2 Beyond Safeguarding Assets: The Role of AI in Analytics and Decision Making

5 AI-BASED IOT SECURITY SOLUTION FORECASTS

5.1 Global AI based Security Solutions in IoT Forecasts 2017 - 2022
5.2 Regional AI based Security Solutions in IoT Forecasts 2017 - 2022
  5.2.1 North America AI based Security Solutions in IoT 2017 - 2022
  5.2.2 Europe AI based Security Solutions in IoT 2017 - 2022
  5.2.3 APAC AI based Security Solutions in IoT 2017 - 2022
  5.2.4 Middle East and Africa AI based Security Solutions in IoT 2017 - 2022
  5.2.5 Latin America AI based Security Solutions in IoT 2017 - 2022

6 SECURITY COMPANIES EVALUATED

6.1 ARM Holdings
6.2 Attivo Networks
6.3 Bastille
6.4 Black Duck Software
6.5 Check Point Software Technologies
6.6 Cisco Systems
6.7 Cylance
6.8 IBM Corporation
6.9 Infineon Technologies AG
6.10 Intel Security Group (McAfee)
6.11 Inside Secure SA
6.12 Mocana
6.13 Neustar
6.14 Overwatch
6.15 Spirent Security
6.16 Symantec
6.17 Trend Micro
6.18 TrustPoint IT
6.19 Wedge Networks
6.20 Wurldtech Security Technologies

7 CONCLUSIONS AND RECOMMENDATIONS

FIGURES

Figure 1: Fog Computing
Figure 2: Fog Computing and Cloud Architecture
Figure 3: Security in Fog Computing

TABLES

Table 1: Cyber Crime in Top 15 Countries
Table 2: Cyber Crime by Category
Table 3: IoT Security Challenges and Solution Areas
Table 4: Global AI based Security Market 2017 - 2022
Table 5: North America AI based Security Market 2017 - 2022
Table 6: Europe AI based Security Market 2017 - 2022
Table 7: APAC AI based Security Market 2017 - 2022
Table 8: ME & Africa AI based Security Market 2017 - 2022
Table 9: Latin America AI based Security Market 2017 - 2022


More Publications