表紙
市場調查報告書

IoT設備認證

Device Authentication in IoT

出版商 ABI Research 商品編碼 941572
出版日期 內容資訊 英文
商品交期: 最快1-2個工作天內
價格
如有價格方面的疑問請按下「詢問」鍵來信查詢
IoT設備認證 Device Authentication in IoT
出版日期: 2020年06月10日內容資訊: 英文
簡介

本報告提供IoT設備認證調查分析,目前演進,技術形勢,市場規模,主要供應商等相關的系統性資訊。

目錄

第1章 摘要整理

第2章 IoT服務設備認證所扮演的角色

  • IoT服務的中心要素分析
  • IoT設備安全的價值鏈:服務及技術
  • 安全和IoT供應商的收益化和ROI的優先事項

第3章 IoT市場資料、定價模式、預測

  • 定義與手法
  • IoT設備安全市場評估
  • IoT安全定價模式

第4章 策略性建議

  • 價值鏈與成本效率
  • PKI必要條件的確認
  • API和保全行動
  • 安全認證服務的缺乏
  • 智慧財產權的保護

第5章 供應商的簡介

  • Amazon Web Services
  • Data I/O
  • Entrust Datacard
  • GlobalSign
  • Intel
  • Microsoft Azure
  • Rambus
目錄
Product Code: AN-5081

Actionable Benefits

  • Adapt your IoT deployment options to coincide with novel secure identity issuance, device authentication, management and cost-efficiency strategies.
  • Develop new IoT monetization models by targeting different sections of the IoT hardware security value chain and stay ahead of the competition.
  • Improve your existing products by gaining insight into key invest priorities and digital security technologies for IoT authentication services.

Critical Questions Answered

  • What is the current evolution of the IoT hardware security value chain and which technologies are gaining momentum?
  • What is the market size for all IoT hardware authentication security technologies? Which sections can implementers hope to tackle?
  • How are IoT identity issuance, provisioning, authentication, management and attestation currently addressed by leading vendors?
  • How can organizations capitalize on current needs for IoT device authentication?
  • What are the pitfalls and investment opportunities for implementers operating across the IoT?

Research Highlights

  • Sustainable growth for IoT hardware security services but highly dependent upon additional investment priorities.
  • Caveats revolving around ecosystem complexity, cryptography and encryption key management, secure manufacturing and intellectual property protection are making their presence known to a wider range of IoT markets.
  • The IoT hardware security value chain is constantly evolving forcing IoT implementers to address previously lacking security operations.
  • A multitude of novel IoT pricing models have emerged allowing for further flexibility for near-future deployment options.

    Who Should Read This?

  • C-level executives, directors and IoT product managers.
  • Hardware and embedded security vendors.
  • Software developers and cloud-focused IoT vendors.
  • Cryptography, certificate authorities and secure manufacturing vendors.
  • Implementers across the entire IoT market landscape with device management and security services
  • Amazon
  • Data I/O
  • Entrust Datacard
  • GlobalSign
  • Intel
  • Microsoft
  • Rambus

TABLE OF CONTENTS

1. EXECUTIVE SUMMARY

2. THE ROLE OF DEVICE AUTHENTICATION IN IOT SERVICES

  • 2.1. Dissecting the Core Elements of IoT Services
  • 2.2. The IoT Device Security Value Chain: Services and Technologies
  • 2.3. Monetization and ROI Priorities for Security and IoT Vendors

3. IOT MARKET DATA, PRICING MODELS, AND PROJECTIONS

  • 3.1. Definitions and Methodology
  • 3.2. IoT Device Security Market Assessment
  • 3.3. IoT Security Pricing Models

4. STRATEGIC RECOMMENDATIONS

  • 4.1. Value Chain and Cost-Efficiency
  • 4.2. Ascertain PKI Requirements
  • 4.3. APIs and Security Operations
  • 4.4. Lacking Security Authentication Services
  • 4.5. Protection of Intellectual Property

5. VENDOR PROFILES

  • 5.1. Amazon Web Services
  • 5.2. Data I/O
  • 5.3. Entrust Datacard
  • 5.4. GlobalSign
  • 5.5. Intel
  • 5.6. Microsoft Azure
  • 5.7. Rambus