Global Information
회사소개 | 문의 | 비교리스트

IoT용 디바이스 인증

Device Authentication in IoT

리서치사 ABI Research
발행일 2020년 06월 상품 코드 941572
페이지 정보 영문
가격
자세한 내용은 문의바랍니다.

본 상품은 리서치사의 방침에 따라 가격이 비공개로 되어 있습니다.
보고서는 상품에 따라 PDF, PPT 또는 Excel로 제공됩니다.


IoT용 디바이스 인증 Device Authentication in IoT
발행일 : 2020년 06월 페이지 정보 : 영문

IoT용 디바이스 인증에 대해 조사 분석했으며, 현재의 진화, 기술 상황, 시장 규모, 주요 벤더 등에 대한 체계적인 정보를 제공합니다.

목차

제1장 주요 요약

제2장 IoT 서비스용 디바이스 인증의 역할

  • IoT 서비스의 중심적 요소를 분석
  • IoT 디바이스 보안 밸류체인 : 서비스와 기술
  • 보안과 IoT 벤더의 수익화와 ROI 우선사항

제3장 IoT 시장 데이터, 가격 모델, 예측

  • 정의와 방법
  • IoT 디바이스 보안 시장 평가
  • IoT 보안 가격 모델

제4장 전략적 제안

  • 밸류체인과 비용 효율
  • PKI 요건 확인
  • API와 보안 운영
  • 보안 인증 서비스의 결여
  • 지적재산의 보호

제5장 벤더 개요

  • Amazon Web Services
  • Data I/O
  • Entrust Datacard
  • GlobalSign
  • Intel
  • Microsoft Azure
  • Rambus
KSM 20.06.25

Actionable Benefits

  • Adapt your IoT deployment options to coincide with novel secure identity issuance, device authentication, management and cost-efficiency strategies.
  • Develop new IoT monetization models by targeting different sections of the IoT hardware security value chain and stay ahead of the competition.
  • Improve your existing products by gaining insight into key invest priorities and digital security technologies for IoT authentication services.

Critical Questions Answered

  • What is the current evolution of the IoT hardware security value chain and which technologies are gaining momentum?
  • What is the market size for all IoT hardware authentication security technologies? Which sections can implementers hope to tackle?
  • How are IoT identity issuance, provisioning, authentication, management and attestation currently addressed by leading vendors?
  • How can organizations capitalize on current needs for IoT device authentication?
  • What are the pitfalls and investment opportunities for implementers operating across the IoT?

Research Highlights

  • Sustainable growth for IoT hardware security services but highly dependent upon additional investment priorities.
  • Caveats revolving around ecosystem complexity, cryptography and encryption key management, secure manufacturing and intellectual property protection are making their presence known to a wider range of IoT markets.
  • The IoT hardware security value chain is constantly evolving forcing IoT implementers to address previously lacking security operations.
  • A multitude of novel IoT pricing models have emerged allowing for further flexibility for near-future deployment options.

    Who Should Read This?

  • C-level executives, directors and IoT product managers.
  • Hardware and embedded security vendors.
  • Software developers and cloud-focused IoT vendors.
  • Cryptography, certificate authorities and secure manufacturing vendors.
  • Implementers across the entire IoT market landscape with device management and security services
  • Amazon
  • Data I/O
  • Entrust Datacard
  • GlobalSign
  • Intel
  • Microsoft
  • Rambus

TABLE OF CONTENTS

1. EXECUTIVE SUMMARY

2. THE ROLE OF DEVICE AUTHENTICATION IN IOT SERVICES

  • 2.1. Dissecting the Core Elements of IoT Services
  • 2.2. The IoT Device Security Value Chain: Services and Technologies
  • 2.3. Monetization and ROI Priorities for Security and IoT Vendors

3. IOT MARKET DATA, PRICING MODELS, AND PROJECTIONS

  • 3.1. Definitions and Methodology
  • 3.2. IoT Device Security Market Assessment
  • 3.3. IoT Security Pricing Models

4. STRATEGIC RECOMMENDATIONS

  • 4.1. Value Chain and Cost-Efficiency
  • 4.2. Ascertain PKI Requirements
  • 4.3. APIs and Security Operations
  • 4.4. Lacking Security Authentication Services
  • 4.5. Protection of Intellectual Property

5. VENDOR PROFILES

  • 5.1. Amazon Web Services
  • 5.2. Data I/O
  • 5.3. Entrust Datacard
  • 5.4. GlobalSign
  • 5.5. Intel
  • 5.6. Microsoft Azure
  • 5.7. Rambus
Back to Top
전화 문의
F A Q