世界各国のリアルタイムなデータ・インテリジェンスで皆様をお手伝い

IoTにおけるデバイス認証

Device Authentication in IoT

Technology Analysis Report | 2Q 2020 | AN-5081

 

出版社 出版年月価格
ABI Research
ABIリサーチ
2020年6月お問い合わせください

サマリー

Actionable Benefits

  • Adapt your IoT deployment options to coincide with novel secure identity issuance, device authentication, management and cost-efficiency strategies.
  • Develop new IoT monetization models by targeting different sections of the IoT hardware security value chain and stay ahead of the competition.
  • Improve your existing products by gaining insight into key invest priorities and digital security technologies for IoT authentication services.

Critical Questions Answered

  • What is the current evolution of the IoT hardware security value chain and which technologies are gaining momentum?
  • What is the market size for all IoT hardware authentication security technologies? Which sections can implementers hope to tackle?
  • How are IoT identity issuance, provisioning, authentication, management and attestation currently addressed by leading vendors?
  • How can organizations capitalize on current needs for IoT device authentication?
  • What are the pitfalls and investment opportunities for implementers operating across the IoT?

Research Highlights

  • Sustainable growth for IoT hardware security services but highly dependent upon additional investment priorities.
  • Caveats revolving around ecosystem complexity, cryptography and encryption key management, secure manufacturing and intellectual property protection are making their presence known to a wider range of IoT markets.
  • The IoT hardware security value chain is constantly evolving forcing IoT implementers to address previously lacking security operations. 
  • A multitude of novel IoT pricing models have emerged allowing for further flexibility for near-future deployment options.

Who Should Read This?

  • C-level executives, directors and IoT product managers.
  • Hardware and embedded security vendors.
  • Software developers and cloud-focused IoT vendors.
  • Cryptography, certificate authorities and secure manufacturing vendors.
  • Implementers across the entire IoT market landscape with device management and security services


目次

Table of Contents

1. EXECUTIVE SUMMARY

2. THE ROLE OF DEVICE AUTHENTICATION IN IOT SERVICES

2.1. Dissecting the Core Elements of IoT Services
2.2. The IoT Device Security Value Chain: Services and Technologies
2.3. Monetization and ROI Priorities for Security and IoT Vendors

3. IOT MARKET DATA, PRICING MODELS, AND PROJECTIONS

3.1. Definitions and Methodology
3.2. IoT Device Security Market Assessment
3.3. IoT Security Pricing Models

4. STRATEGIC RECOMMENDATIONS

4.1. Value Chain and Cost-Efficiency
4.2. Ascertain PKI Requirements
4.3. APIs and Security Operations
4.4. Lacking Security Authentication Services
4.5. Protection of Intellectual Property

5. VENDOR PROFILES

5.1. Amazon Web Services
5.2. Data I/O
5.3. Entrust Datacard
5.4. GlobalSign
5.5. Intel
5.6. Microsoft Azure
5.7. Rambus
5.3. Entrust Datacard
5.4. GlobalSign
5.5. Intel
5.6. Microsoft Azure
5.7. Rambus

 

ページTOPに戻る

あなたが最近チェックしたレポート一覧

  • 最近チェックしたレポートはありません。

お問合は、お電話またはWEBから承ります。お見積もりの作成もお気軽にご相談ください。

webからのお問合せはこちらのフォームから承ります

このレポートへのお問合せ

03-3582-2531

電話お問合せもお気軽に

<無料>メルマガに登録する

 

 

ページTOPに戻る