Cover Image
市場調查報告書

安全供應商導向IoT市場

The Internet of Things For Security Providers

出版商 Juniper Research 商品編碼 422971
出版日期 內容資訊 英文
商品交期: 最快1-2個工作天內
價格
Back to Top
安全供應商導向IoT市場 The Internet of Things For Security Providers
出版日期: 2018年07月11日 內容資訊: 英文
簡介

本報告提供IoT (物聯網) 網路安全形勢的相關調查,安全的IoT部署的主要策略的方法相關的詳細的分析,目前形勢,未來的課題與其應對法等考察。

策略 & 競爭情形

第1章 IoT:投資 & 市場趨勢

  • 簡介
  • IoT的開發階段
  • IoT定義
  • M&A及投資活動

第2章 IoT網路安全策略的展望

  • 簡介
  • 主要建議:設計的安全
  • 網路安全必要條件的變化
  • IoT的影響
  • IoT架構:邊緣運算
  • IoT技術:LPWAN技術的影響分析

第3章 IoT供應商分析

  • 簡介
  • IoT網路安全的有勢力者
  • 供應商分析

資料 & 預測

第1章 IoT市場形勢

  • 簡介
  • IoT的開發階段
  • IoT定義

第2章 IoT網路安全:預測摘要

  • 簡介
  • 市場區隔、支出模式
  • 調查手法、前提條件
  • 地區的IoT網路安全支出全體
  • 市場區隔的IoT網路安全支出全體
  • 連網型設備的摘要

第3章 消費者市場:IoT網路安全支出

  • 簡介
  • 家庭自動化
  • 聯網消費者車輛
  • 數位健康

第4章 產業市場:IoT網路安全支出

  • 簡介
  • 零售
  • 連網型工商業 (C&I) 大樓
  • 農業

第5章 公共服務的IoT網路安全支出

  • 簡介
  • 智慧路燈
  • 智慧型能源
  • 智慧流量 & 智慧停車

本網頁內容可能與最新版本有所差異。詳細情況請與我們聯繫。

目錄

Overview

Juniper's latest ‘Internet of Things for Security Providers’ research offers critical analysis of the IoT (Internet of Things) cybersecurity landscape; providing in-depth coverage of key strategic approaches for securing IoT deployments. It examines the present landscape, as well as offering valuable insight into future challenges and how they can be addressed.

Juniper's incisive research provides additional analysis into the changing technological landscape of the IoT; examining how both edge computing and LPWAN (Low Power Wide Area Network) technologies are likely to impact future security requirements.

Juniper's security dataset covers key IoT market segments, including:

  • Consumer
  • Industrial
  • Public Services

This research suite comprises:

  • Deep Dive Strategy & Competition (PDF)
  • 5 Year Deep Dive Data & Forecasting (PDF & Excel)
  • Executive Summary & Core Findings (PDF)

Key Features

  • IoT Security Analyses: Including current and future strategies, challenges and approaches for:
    • Security by Design
    • Lifecycle Management
    • Identity Management
    • Behavioural Analysis
    • Legislation
  • Sector Dynamics: Analyses of future implications for IoT security in terms of:
    • Edge Computing
    • Low Power Wide Area Networks
  • Juniper Leaderboard: 12 IoT solution vendors compared, scored and positioned on the Juniper Leaderboard matrix, including:
    • achelos
    • Carbon Black
    • CyberArk
    • Darktrace
    • FireEye
    • Gemalto
    • Giesecke+Devrient
    • Optiv
    • Palo Alto Networks
    • Positive Technologies
    • Rubicon Labs
    • Symantec
  • Benchmark Industry Forecasts: Market forecasts for IoT security spend across key segments:
    • Consumer: Smart Home, Connected Cars, Digital Health
    • Industrial: Retail, Connected Buildings, Agriculture
    • Public Services: Smart Street Lighting, Smart Energy, Smart Traffic & Parking

Key Questions

  • 1. Which verticals in the IoT are poised as high growth security markets?
  • 2. What factors will play the most significant role in determining IoT security spend?
  • 3. How must customers approach the IoT in terms of cybersecurity risk management?
  • 4. What are the key strategic challenges for IoT security?
  • 5. What is the future outlook for the market in terms of architecture and technology?

Companies Referenced

  • Interviewed: achelos, ADLINK, Gemalto, Giesecke+Devrient, OpenFog Consortium, Vodafone.
  • Profiled: achelos, Carbon Black, CyberArk, Darktrace, FireEye, Gemalto, Giesecke+Devrient, Optiv, Palo Alto Networks, Positive Technologies, Rubicon Labs, Symantec.
  • Case Studied: OpenFog Consortium.
  • Mentioned: Accenture, Akamai, Allianz, Amazon, Apple, Arm, Array Networks, Avancial, Belden, BH Global, Blue Coat, BMC Software, Box, BT, C3 Alliance, Caterpillar, Check Point Software Technologies, Cisco, Comodo, Comptel, Conexsys, Conjur, CriticalBlue, Cumulocity, Cyber Security Coalition, Cybereason, Decision Lab, Dell, Deloitte, Deutsche Post, Dialog Semiconductor, Didi Chuxing, DigiCert, Dropbox, Duo Security, Equifax, Ericsson, Ernst & Young, Evident.io, FlowThings, ForeScout, Foxconn, G Suite, Google, HP, IBM, IDnow, Ingenu, Intel, Invotas, IoT Cybersecurity Alliance, iSight Partners, Juniper Networks, Katerra, Kite Distribution, KKR, LightCyber, LinkedIn, Lockheed-Martin, LogRhythm, M2MD, MAS (Monetary Authority of Singapore), Metro Bank, Micron, Microsoft, Motorola, Murata, NATO, Nokia, Numerex, NVIDIA, NXP, Oracle, Otono Networks, Petuum, Peugeot, Pitney Bowes, Proofpoint, Prudential, PwC, Qualcomm, Qualys, Rapid7, Rockwell Automation, SailPoint, Salesforce, Samsung, SAP, Secdo, secunet, SecureAuth, Semtech, Sharp, Sierra Wireless, Sigfox, Silego, SK Telecom, Société Générale, Softbank, Software AG, Splunk, STMicroelectronics, Tanium, Telefónica, Telstra, Tenable Network Security, Texas Instruments, Thales, Toppan, Toyota, Tripwire, UniCredit, Uptake, Varonis, Vaultive, Viptela, Visa, VMWare, WolfSSL, X15, Zementis.

Data & Interactive Forecast

Juniper's ‘Internet of Things’ forecast suite includes:

  • Forecasts for 8 key regions as well as 11 countries including:
    • Canada
    • China
    • Denmark
    • Germany
    • Japan
    • Norway
    • Portugal
    • Spain
    • Sweden
    • UK
    • US
  • IoT Devices
    • Consumer Devices
    • All Other IoT Devices (Industrial & Enterprise)
  • Consumer Market
    • Smart Home, Connected Vehicles, Digital Health Monitoring
    • Product/Service Provider Security Spend
  • Industrial Market
    • Retail, Connected Buildings, Agriculture
    • End-customer Security Spend
  • Public Services Market
    • Smart Street Lighting, Smart Metering, Smart Grid Distribution Automation, Smart Traffic Management, Smart Parking
    • End-customer Security Spend
  • Interactive Scenario Tool allowing users to manipulate Juniper's data for 12 different metrics.
  • Access to the full set of forecast data of 30 tables and over 4,000 datapoints.

Juniper Research's highly granular interactive Excels enable clients to manipulate Juniper's forecast data and charts to test their own assumptions using the Interactive Scenario Tool; and compare select markets side by side in customised charts and tables. IFxls greatly increase clients' ability to both understand a particular market and to integrate their own views into the model.

Table of Contents

Deep Dive Strategy & Competition

1. IoT 2018: Investments & Market Movements

  • 1.1 Introduction
  • 1.2 IoT Development Phases
    • Figure 1.1: Juniper Phased Evolution Model: Internet of Things
    • 1.2.1 State of Market Development in the Enterprise & Public Space
  • 1.3 Definition of the Internet of Things
  • 1.4 M&A and Investment Activity
    • 1.4.1 M&A (Mergers & Acquisitions)
    • 1.4.2 Key Investment Activity

2. IoT Cybersecurity Strategic Outlook

  • 2.1 Introduction
  • 2.2 Core Recommendation: Security by Design
  • 2.3 Changing Cybersecurity Requirements
    • 2.3.1 Behavioural Analysis
      • Case Study: Cerber - Evading Machine Learning
  • 2.4 Impact of the IoT
    • 2.4.1 The Case for Decentralised Storage
    • 2.4.2 Identity Management
      • i. Weaknesses in Digital Certificates
        • Figure 2.1: Illicit CA Certificate Marketplace
      • ii. The Need for Lifecycle Management
    • 2.4.3 Cybersecurity Legislation
      • Case Study: Internet of Things (IoT) Cybersecurity Improvement Act of 2017
  • 2.5 IoT Architecture: Edge Computing
    • Figure 2.2: Classic IoT Deployment Architecture
    • i. Key Impacts
    • ii. Current Landscape
      • Figure 2.3: Edge vs Fog
    • iii. Future Outlook: required Strategic Considerations
      • Case Study: OpenFog Consortium
    • iv. Deployment Models
    • v. Service Models
  • 2.6 IoT Technologies: LPWAN Technology Impact Analysis
    • Table 2.4: LPWAN Technology Impact Analysis, Present Landscape
    • 2.6.2 Future Outlook: Required Strategic Considerations

3. IoT Vendor Analysis

  • 3.1 Introduction
    • Table 3.1: IoT Cybersecurity Vendor Capability Assessment Criteria
    • 3.1.1 Leaderboard Scoring Results
      • Table 3.2: Juniper Leaderboard: IoT Cybersecurity Solutions Vendors
      • Figure 3.3: Juniper Leaderboard: IoT Cybersecurity Solutions Vendors
    • 3.1.2 Vendor Groupings
      • i. Established Leaders
      • ii. Leading Challengers
      • iii. Disruptors & Emulators
    • 3.1.3 Limitations & Interpretations
  • 3.2 IoT Cybersecurity Movers & Shakers
  • 3.3 Vendor Analysis
    • 3.3.1 achelos
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Strategic Development Opportunities
    • 3.3.2 Carbon Black
      • i. Corporate Profile
        • Table 3.4: Carbon Black Financial Snapshot ($m) 2015-2017
        • Table 3.5: Carbon Black Recent Acquisitions
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 3.3.3 CyberArk
      • i. Corporate Profile
        • Table 3.6: CyberArk Financial Snapshot ($m) 2015-2017
        • Table 3.7: CyberArk Recent Acquisitions
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 3.3.4 Darktrace
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 3.3.5 FireEye
      • i. Corporate Profile
        • Table 3.8: FireEye Financial Snapshot ($m) 2015-2017
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 3.3.6 Gemalto
      • i. Corporate
        • Table 3.9: Gemalto Financial Snapshot 2015-2017
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 3.3.7 Giesecke+Devrient
      • i. Corporate Profile
        • Table 3.10: G+D Financial Snapshot (€m) 2015-2017
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 3.3.8 Optiv
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 3.3.9 Palo Alto Networks
      • i. Corporate Profile
        • Table 3.11: Palo Alto Networks Financial Snapshot ($m) 2015-2017
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 3.3.10 Positive Technologies
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High Level View of IoT Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities
    • 3.3.11 Rubicon Labs
      • i. Corporate Profile
      • ii. Geographic Spread
      • iii. Key Clients & Partnerships
      • iv. High Level View of Offerings
      • v. Juniper's View: Key Strengths & Strategic Development Opportunities
    • 3.3.12 Symantec
      • i. Corporate Profile
        • Table 3.12: Symantec Financial Snapshot ($m) 2016-2018
        • Table 3.13: Recent Symantec Acquisitions
      • ii. Geographic Spread
      • iii. Key Clients & Strategic Partnerships
      • iv. High Level View of IoT Offerings
      • v. Juniper's View: Key Strengths & Development Opportunities

Deep Dive Data & Forecasting

1. IoT Market Landscape

  • 1.1 Introduction
  • 1.2 IoT Development Phases
    • Figure 1.1: Juniper Phased Evolution Model: Internet of Things
    • 1.2.1 State of Market Development in the Enterprise & Public Space
  • 1.3 Definition of the Internet of Things

2. IoT Cybersecurity: Forecast Summary

  • 2.1 Introduction
    • 2.1.1 Devices
  • 2.2 Segments & Spend Model
  • 2.3 Methodology & Assumptions
    • Figure 2.1: IoT Cybersecurity Spend Methodology
  • 2.4 Total Regional IoT Cybersecurity Spend
    • Figure & Table 2.2: Total Small, Medium & Large Business Spend on IoT Cybersecurity ($m), Split by 8 Key Regions 2018-2023
  • 2.5 Total Segment IoT Cybersecurity Spend
    • Figure & Table 2.3: Total Small, Medium & Large Business Spend on IoT Cybersecurity ($m), Split by IoT Segment 2018-2023
  • 2.6 Connected Devices Summary
    • 2.6.1 Consumer IoT Units
      • Figure & Table 2.4: Installed Base Consumer IoT Units (m), Split by 8 Key Regions 2018-2023
    • 2.6.2 Other IoT Units
      • Figure & Table 2.5: Other IoT Unit Installed Base (m), Split by 8 Key Regions 2018-2023
    • 2.6.3 Total IoT Installed Base
      • Figure & Table 2.6: Total IoT Unit Installed Base (m), Split by 8 Key Regions 2018-2023

3. Consumer Markets: IoT Cybersecurity Spend

  • 3.1 Introduction
  • 3.2 Home Automation Cybersecurity Spend
    • Figure & Table 3.1: Home Automation Vendor Annual Spend on IoT Cybersecurity ($m), Split by 8 Key Regions 2018-2023
  • 3.3 Connected Consumer Vehicle Cybersecurity Spend
    • Figure & Table 3.2: Consumer Connected Vehicle Vendor Annual Spend on Cybersecurity ($m), Split by 8 Key Regions 2018-2023
  • 3.4 Digital Health Cybersecurity Spend
    • Figure & Table 3.3: Digital Health Vendor Annual Spend on Cybersecurity ($m), Split by 8 Key Regions 2018-2023

4. Industrial Markets: IoT Cybersecurity Spend

  • 4.1 Introduction
  • 4.2 Retail IoT Cybersecurity Spend
    • Figure & Table 4.1: Retailer Annual Spend on IoT Cybersecurity ($m), Split by Key Regions 2018-2023
  • 4.3 Connected Commercial & Industrial Buildings IoT Cybersecurity Spend
    • Figure & Table 4.2: Annual Spend for Connected Commercial & Industrial Buildings Cybersecurity ($m), Split by 8 Key Regions 2018-2023
  • 4.4 Agriculture IoT Cybersecurity Spend
    • Figure & Table 4.3: Agricultural Annual Spend on IoT Cybersecurity ($m), Split by 8 Key Regions 2018-2023

5. Public Services IoT Cybersecurity Spend

  • 5.1 Introduction
  • 5.2 Smart Street Lighting Cybersecurity Spend
    • Figure & Table 5.1: Annual Spend for Smart Street Lighting Cybersecurity ($m), Split by 8 Key Regions 2018-2023
  • 5.3 Smart Energy Cybersecurity Spend
    • Figure & Table 5.2: Annual Spend on Smart Energy Cybersecurity ($m), Split by Key Regions 2018-2023
  • 5.4 Smart Traffic & Smart Parking Cybersecurity Spend
    • Figure & Table 5.3: Annual Spend on Smart Traffic & Parking Cybersecurity ($m), Split by 8 Key Regions 2018-2023
Back to Top