NEWS: 公告在東京證券交易所JASDAQ標準市場新上市

表紙
市場調查報告書

安全IoT的設備端結構

Secure IoT On-Device Architectures

出版商 ABI Research 商品編碼 1009791
出版日期 內容資訊 英文
商品交期: 最快1-2個工作天內
價格
如有價格方面的疑問請按下「詢問」鍵來信查詢
安全IoT的設備端結構 Secure IoT On-Device Architectures
出版日期: 2021年06月07日內容資訊: 英文
簡介

本報告提供安全IoT的設備端結構的相關調查,現在市場上市的IoT設備可利用的設備端安全技術的詳細明細,競爭情形與經營模式整體性分析,商機等資訊。

目錄

第1章 摘要整理

第2章 風險的評估

  • IoT的擴大
  • 增大的威脅情勢
  • 對安全的設備端方法
  • 設備的保護

第3章 有規定的設備

  • Check Point Software Technologies
  • Karamba Security
  • Red Balloon Security
  • RunSafe Security
  • Sternum
  • Verimatrix

第4章 中階及智慧裝置

  • 可靠的實行環境
  • 虛擬化,貨櫃,及管理程序
  • 軟體保護簡介和標準
  • 指南和最佳業務實踐
  • Prove & Run
  • Qualcomm
  • SiFive
  • Trustonic
  • ZAYA
目錄
Product Code: AN-5244

Actionable Benefits:

  • Identify optimal security architectures for various IoT devices capabilities (constrained and multi-function).
  • Understand end-market opportunities for on-device security solutions.
  • Determine appropriate business models for on-device security products and services.

Critical Questions Answered:

  • What are the security capabilities available for different target applications and use cases?
  • What does the competitive landscape for secure IoT on-device architectures look like?
  • What is the revenue opportunity for the most mature technologies?

Research Highlights:

  • A detailed breakdown of on-device security technologies available for IoT devices on the market today.
  • A comprehensive analysis of the competitive landscape and business models adopted.
  • The dominating Trusted Execution Environment market broken out by end market applications.

Who Should Read This?

  • IoT device manufacturers, silicon IP and semiconductor providers.
  • Software and application developers.
  • Security service providers (managed & cloud).

Companies Mentioned:

  • Check Point
  • Karamba Security
  • Prove & Run
  • Qualcomm
  • Red Balloon Security
  • RunSafe Security
  • SiFive
  • Sternum
  • Trustonic
  • Verimatrix
  • ZAYA

TABLE OF CONTENTS

1. EXECUTIVE SUMMARY

2. ASSESSING THE RISK

  • 2.1. IoT Expansion
  • 2.2. A Growing Threat Landscape
  • 2.3. On-Device Approaches to Security
  • 2.4. Securing DeviceS

3. CONSTRAINED DEVICES

  • 3.1. Check Point Software Technologies
  • 3.2. Karamba Security
  • 3.3. Red Balloon Security
  • 3.4. RunSafe Security
  • 3.5. Sternum
  • 3.6. Verimatrix

4. MID-RANGE AND SMART DEVICES

  • 4.1. Trusted Execution Environments
  • 4.2. Virtualization, Containers, and Hypervisors
  • 4.3. Software Protection Profiles and Standards
  • 4.4. Guidelines and Best Practices
  • 4.5. Prove & Run
  • 4.6. Qualcomm
  • 4.7. SiFive
  • 4.8. Trustonic
  • 4.9. ZAYA