Global Information
회사소개 | 문의 | 비교리스트

사물인터넷(IoT) 보안 : 기술과 세계 시장

Internet of Things (IoT) Security: Technologies and Global Markets

리서치사 BCC Research
발행일 2020년 06월 상품 코드 945139
페이지 정보 영문 158 Pages
가격
US $ 5,500 ₩ 6,497,000 PDF (Single User License)
US $ 6,600 ₩ 7,796,000 PDF (2-5 Users)
US $ 7,920 ₩ 9,355,000 PDF (Site License)
US $ 9,504 ₩ 11,227,000 PDF (Enterprise License)


사물인터넷(IoT) 보안 : 기술과 세계 시장 Internet of Things (IoT) Security: Technologies and Global Markets
발행일 : 2020년 06월 페이지 정보 : 영문 158 Pages

세계의 사물인터넷(IoT) 보안 시장은 2020-2025년의 예측 기간 중 25.9%의 연평균 성장률(CAGR)로 성장하고, 2020년 162억 달러에서 2025년까지 512억 달러에 달할 전망입니다.

세계 IoT 보안 시장의 북미 지역은 2020-2025년의 예측 기간에 CAGR이 24.4%로, 2020년 48억 달러에서 2025년에는 143억 달러로 성장할 것으로 예상되고 있습니다.

세계 IoT 보안 시장의 아시아태평양은 2020-2025년의 예측 기간에 CAGR이 28.3%로, 2020년 37억 달러에서 2025년에는 129억 달러로 성장할 것으로 예상되고 있습니다.

COVID-19는 2020년 초반부터 사회에 큰 영향을 미치고 있습니다. 리포트에서는 COVID-19의 영향과 다양한 국가에서의 록다운에 의해 발생된 경기침체에 대해 분석하고 있습니다. 사람들이 사회적 거리두기를 지키고 기술에 대한 의존도를 높이는 경우, IoT 보안의 위협과 사이버 공격이 증가하는 것을 알 수 있습니다. IoT 보안 솔루션의 수요는 COVID-19의 유행에 수반하여 증가하며, IoT 보안 기술 시장을 지원할 것으로 예상되고 있습니다.

세계의 사물인터넷(IoT) 보안 시장에 대해 조사분석했으며, 기술 배경, COVID-19의 영향 분석, 부문별 분석, 시장 기회 분석, 주요 기업에 관한 정보를 정리하여 전해드립니다.

목차

제1장 서론

  • 조사 목표와 목적
  • 조사 이유
  • 리포트 범위
  • 조사 방법
  • 대상 독자
  • 애널리스트의 경력
  • 맞춤형 조사
  • 관련 리포트

제2장 정리와 하이라이트

제3장 시장 개요

  • IoT 보안 솔루션 : 개요
  • 차이점 : IoT 보안, 사이버 보안, 기업용 IT 보안
  • IoT 데이터 보안의 기준과 규제
  • IoT 데이터 보안의 현재 기준
  • IoT 보안의 미래
  • 기술 동향
  • IoT 보안의 위협
  • IoT 보안의 위협 유형
  • IoT 보안 공격의 유형
  • 최근 IoT 시스템 보안 침해 이벤트와 DDoS 공격
  • IoT 보안 솔루션 프레임워크
  • IoT 보안 시스템의 일반적인 아키텍처
  • 하드웨어와 소프트웨어 기반 보안
  • IoT 보안의 고려사항
  • 시큐어 부트
  • 세션 인증 : 진실의 루트
  • 디바이스와 데이터 인증 : 테크닉과 표준
  • IoT 데이터 암호화
  • 공격의 일반적인 방법
  • 공개 키 기반 구조 모델
  • 네트워크 접속층에서의 보안
  • IoT 솔루션과 애플리케이션의 보호
  • 디바이스의 보안, 관리, 업데이트
  • COVID-19의 영향
  • 경제적 영향
  • IoT 위협의 상황

제4장 보안 유형별 시장

  • 서론
  • 엔드포인트 보안/디바이스 보안
  • 개요
  • 신뢰할 수 있는 IoT 시행 사이클을 보증하는 방법
  • 네트워크 보안
  • 전체
  • IoT 디바이스용 무선 접속 솔루션
  • 애플리케이션 보안
  • 코드 서명을 사용한 애플리케이션 보안(ncipher.com)
  • 클라우드 보안
  • 표준 기반 베스트 프랙티스
  • PKI : 클라우드 애플리케이션의 보호
  • 클라우드 액세스 보안 브로커
  • 클라우드 기반 데이터 보호를 위한 시장 솔루션
  • 기타

제5장 컴포넌트별 시장

  • 서론
  • 플랫폼
  • 인기 IoT 보안 플랫폼
  • 솔루션
  • ID 액세스 관리
  • 데이터 암호화
  • 침입 방지/침입 탐지 시스템
  • 분산형 서비스 거부(DDoS) 보호
  • 디바이스 인증과 관리
  • 기타
  • 서비스
  • 전문 서비스
  • 매니지드 서비스

제6장 조직 규모별 시장

  • 서론
  • 대기업
  • 중소기업

제7장 최종 용도별 시장

  • 서론
  • 자동차
  • 기업용 보안 솔루션
  • 의료
  • 소매·E-Commerce
  • 스마트홈
  • 에너지·유틸리티
  • 제조
  • 정부기관
  • 기타
  • 미디어·엔터테인먼트
  • BFSI

제8장 지역별 시장

  • 서론
  • 북미
  • 미국
  • 캐나다
  • 유럽
  • 영국
  • 독일
  • 프랑스
  • 스페인
  • 아시아태평양
  • 일본
  • 중국
  • 인도
  • 중동·아프리카
  • 이스라엘
  • 사우디아라비아
  • 남아프리카공화국
  • 남미
  • 브라질

제9장 시장 기회 분석

  • IoT 과제
  • 디바이스 레이어 보안 : 시장 기회
  • 애플리케이션과 클라우드 레이어 보안 : 시장 기회
  • 네트워크 기반 보안 : 시장 기회
  • 애플리케이션과 클라우드 보안 : 시장 기회
  • 클라우드 기반 솔루션
  • IoT 플랫폼 : 시장 기회
  • 지역의 시장 기회
  • 유럽 시장
  • 아시아태평양 시장
  • 북미 시장
  • 투자 기회 : 조사와 혁신

제10장 경쟁 분석

  • IoT 보안 시장에서 부여된 특허의 개요
  • WISeKey 특허
  • DEVICE AUTHORITY
  • 주요 시장 동향

제11장 기업 개요

  • AEROHIVE
  • ARXAN
  • ARM
  • ATMEL
  • BROADSTAR INFORMATION TECHNOLOGIES
  • CENTRI TECHNOLOGY
  • CERTIFIED SECURITY SOLUTIONS INC.
  • CISCO SYSTEMS INC.
  • DEVICE AUTHORITY
  • DIGICERT INC.
  • ENTRUST DATACARD
  • ESCRYPT
  • FIREEYE
  • FORESCOUT TECHNOLOGIES INC.
  • FORGEROCK
  • GEMALTO
  • GLOBALSIGN INC.
  • GREAT BAY SOFTWARE INC.
  • ICON LABS
  • IMAGINATION TECHNOLOGIES
  • INFINEON
  • INSIDE SECURE
  • INTRINSIC-ID
  • MDS TECHNOLOGY
  • MICROCHIP TECHNOLOGY INC.
  • MICROSOFT
  • MOCANA
  • NXP SEMICONDUCTORS
  • OBERTHUR TECHNOLOGIES
  • PROTEGRITY INC.
  • PROVE AND RUN
  • 르네사스
  • RUBICON LABS
  • SECURERF
  • SECURITHINGS LTD.
  • SEQUITUR LABS INC.
  • SUREPASSID
  • SYMANTEC
  • SYNOPSYS
  • THALES E-SECURITY INC.
  • TRILLIUM
  • TRUSTONIC
  • TYFONE
  • UTIMACO
  • WISEKEY SA
  • ZINGBOX INC.

제12장 부록 : 두자어

KSA 20.07.10

List of Tables

  • Summary Table : Global Market for IoT Security, by Region, Through 2025
  • Table 1 : Key Technology Trends: IoT Security Solutions Segment
  • Table 2 : Global Market for IoT Security, by Type of Security, Through 2025
  • Table 3 : Global Market for IoT Endpoint Security, by Region, Through 2025
  • Table 4 : Global Market for IoT Network Security, by Region, Through 2025
  • Table 5 : Global Market for IoT Application Security, by Region, Through 2025
  • Table 6 : Global Market for IoT Cloud Security, by Region, Through 2025
  • Table 7 : Global Market for Other Types of IoT Security, by Region, Through 2025
  • Table 8 : Global Market for IoT Security, by Component, Through 2025
  • Table 9 : Global Market for IoT Security Platforms, by Region, Through 2025
  • Table 10 : Global Market for IoT Security Solutions, by Type, Through 2025
  • Table 11 : Global Market for IoT-Based IAM Solutions, by Region, Through 2025
  • Table 12 : Global Market for IoT-Based Data Encryption, by Region, Through 2025
  • Table 13 : Global Market for IoT-Based IPS/IDS, by Region, Through 2025
  • Table 14 : Global Market for IoT-Based Distributed Denial of Service Protection, by Region, Through 2025
  • Table 15 : Global Market for IoT-Based Device Authentication and Management, by Region, Through 2025
  • Table 16 : Global Market for Other Types of IoT-Based Solutions, by Region, Through 2025
  • Table 17 : Global Market for IoT Security Services, by Type of Service, Through 2025
  • Table 18 : Global Market for IoT-Based Professional Services, by Region, Through 2025
  • Table 19 : Global Market for IoT-Based Managed Services, by Region, Through 2025
  • Table 20 : Global Market for IoT Security, by Organization Size, Through 2025
  • Table 21 : Global Market for IoT Security for Large Enterprises, by Region, Through 2025
  • Table 22 : Global Market for IoT Security for SMEs, by Region, Through 2025
  • Table 23 : Global Market for IoT Security, by End-Use Segment, Through 2025
  • Table 24 : Global Market for IoT Security in the Automotive Industry, by Region, Through 2025
  • Table 25 : Global Market for IoT Security in the Healthcare Industry, by Region, Through 2025
  • Table 26 : Global Market for IoT Security in Retail and eCommerce Applications, by Region, Through 2025
  • Table 27 : Global Market for IoT Security in Smart Home Applications, by Region, Through 2025
  • Table 28 : Global Market for IoT Security in Energy and Utility Applications, by Region, Through 2025
  • Table 29 : Global Market for IoT Security in the Manufacturing Industry, by Region, Through 2025
  • Table 30 : Global Market for IoT Security in the Government Sector, by Region, Through 2025
  • Table 31 : Global Market for IoT Security in Other Industries, by Region, Through 2025
  • Table 32 : North American Market for IoT Security, by Type of Security, Through 2025
  • Table 33 : North American Market for IoT Security, by Component, Through 2025
  • Table 34 : North American Market for IoT Security, by Solution, Through 2025
  • Table 35 : North American Market for IoT Security, by Type of Service, Through 2025
  • Table 36 : North American Market for IoT Security, by Organization Size, Through 2025
  • Table 37 : North American Market for IoT Security, by End-Use Segment, Through 2025
  • Table 38 : North American Market for IoT Security, by Country, Through 2025
  • Table 39 : European Market for IoT Security, by Type of Security, Through 2025
  • Table 40 : European Market for IoT Security, by Component, Through 2025
  • Table 41 : European Market for IoT Security, by Solution, Through 2025
  • Table 42 : European Market for IoT Security, by Type of Service, Through 2025
  • Table 43 : European Market for IoT Security, by Organization Size, Through 2025
  • Table 44 : European Market for IoT Security, by End-Use Segment, Through 2025
  • Table 45 : European Market for IoT Security, by Country, Through 2025
  • Table 46 : Asia-Pacific Market for IoT Security, by Type of Security, Through 2025
  • Table 47 : Asia-Pacific Market for IoT Security, by Component, Through 2025
  • Table 48 : Asia-Pacific Market for IoT Security, by Solution, Through 2025
  • Table 49 : Asia-Pacific Market for IoT Security, by Type of Service, Through 2025
  • Table 50 : Asia-Pacific Market for IoT Security, by Organization Size, Through 2025
  • Table 51 : Asia-Pacific Market for IoT Security, by End-Use Segment, Through 2025
  • Table 52 : Asia-Pacific Market for IoT Security, by Country, Through 2025
  • Table 53 : Middle East and African Market for IoT Security, by Type of Security, Through 2025
  • Table 54 : Middle East and African Market for IoT Security, by Component, Through 2025
  • Table 55 : Middle East and African Market for IoT Security, by Solution, Through 2025
  • Table 56 : Middle East and African Market for IoT Security, by Type of Service, Through 2025
  • Table 57 : Middle East and African Market for IoT Security, by Organization Size, Through 2025
  • Table 58 : Middle East and African Market for IoT Security, by End-Use Segment, Through 2025
  • Table 59 : Middle East and African Market for IoT Security, by Country, Through 2025
  • Table 60 : South American Market for IoT Security, by Type of Security, Through 2025
  • Table 61 : South American Market for IoT Security, by Component, Through 2025
  • Table 62 : South American Market for IoT Security, by Solution, Through 2025
  • Table 63 : South American Market for IoT Security, by Type of Service, Through 2025
  • Table 64 : South American Market for IoT Security, by Organization Size, Through 2025
  • Table 65 : South American Market for IoT Security, by End-Use Segment, Through 2025
  • Table 66 : South American Market for IoT Security, by Country, Through 2025
  • Table 67 : Key Strategies Used by Companies in the Global Market for IoT Security Technologies, May 2020
  • Table 68 : Acronyms Used in This Report

List of Figures

  • Summary Figure : Global Market Shares of IoT Security, by Region, 2020
  • Figure 1 : Typical Architecture for IoT Systems and Security Layers
  • Figure 2 : Global Market for IoT Security, by Type of Security, 2019-2025
  • Figure 3 : Global Market for IoT Security, by Component, 2019-2025
  • Figure 4 : Global Market for IoT Security Solutions, by Type, 2019-2025
  • Figure 5 : Global IoT Security Services Market, by Type of Service, 2019-2025
  • Figure 6 : Global Market for IoT Security, by Organization Size, 2019-2025
  • Figure 7 : Global Market for IoT Security, by End-Use Segment, 2019-2025
  • Figure 8 : Global Market for IoT Security, by Region
  • Figure 9 : Global Market for IoT Security, by Region, 2019-2025

Highlights:

The global Internet of Things (IoT) security market should reach $51.2 billion by 2025 from $16.2 billion in 2020 at a compound annual growth rate (CAGR) of 25.9% for the forecast period of 2020 to 2025.

The North America region of the global IoT security market is expected to grow from $4.8 billion in 2020 to $14.3 billion in 2025 at a CAGR of 24.4% for the forecast period of 2020 to 2025.

The Asia-Pacific region of the global IoT security market is expected to grow from $3.7 billion in 2020 to $12.9 billion in 2025 at a CAGR of 28.3% for the forecast period of 2020 to 2025.

Report Scope:

This report analyzes the market for commercialized IoT security solutions. It helps readers to understand how the IoT security solutions market will evolve and how trends will impact its adoption. The report focuses on security solutions that have been developed or customized to meet the unique needs of IoT systems. Services provided for integrating such solutions or managed security services are also included in the scope of this report.

This BCC Research study was conducted with a global perspective in terms of IoT security solution technology and its applications. Market projections have been conducted for five geographic regions: North America, South America, Europe, Middle East and Africa (MEA) and Asia-Pacific. All market reported revenues are in constant 2019 U.S. dollars.

The scope of this report encompasses various technologies used in IoT security solutions. The market is also divided based on the size of the enterprises adopting IoT security technologies. Additionally, the application industry for the market is segmented into automotive, healthcare, retail and ecommerce, smart homes, energy and utilities, manufacturing, government and others (including media and entertainment and BFSI sectors). The present global market offers an opportunity to the stakeholders, largely because of a surge in cloud-based services and the increased use of IoT devices, specifically in sectors like healthcare and manufacturing.

This report highlights different security types in the market for IoT security technologies, including device/endpoint security, network security, application security, cloud security and others (email security and web security). The market is also divided by its major components (platforms, solutions and services). The solution part is further split up into identity and access management (IAM), data encryption, intrusion detection system/intrusion prevention system, distributed denial of service (DDoS) protection, device authentication and management and others (firmware update, security analytics, PKI lifecycle management, etc.). The services segment is sub-divided into professional services and managed services. The estimated and forecast market revenue considered in this report are the summation of prices for software, hardware and subscription services.

This report also offers insights on drivers, restraints and opportunities for the market, gathered through primary and secondary research. Strategies adopted by the companies in the global market are provided in this report, to analyze ongoing trends in the market. This report provides market share analysis and key vendor profiles of top IoT security companies. The regional level study includes North America, Europe, Asia-Pacific, the Middle East and Africa and the South American region.

COVID-19 has had a massive impact on society since the beginning of 2020. This report considers the impact of COVID-19 and the economic slowdown created due to lockdown in various countries. When people are following social distancing and relying more on technology, it is observed that IoT security threats are increased, and there are more cyber-attacks. It is expected that the demand for IoT security solutions will increase in the wake of the COVID-19 pandemic and boost the market for IoT security technologies.

Report Includes:

  • 69 tables
  • Descriptive study and in-depth analysis of the global Internet of Things (IoT) security solutions and technologies market
  • Analyses of the global market trends, with data corresponding to market size for 2019, estimates for 2020 and projections of compound annual growth rates (CAGRs) through 2025
  • Information pertaining to industry value chain analysis providing a systematic study of the key intermediaries involved, which could further assist stakeholders in formulating appropriate strategies
  • Market share analysis of the leading companies encompassing their successful marketing strategies, key competitive landscape and recent developments
  • Discussion of the various IoT solutions and different security features embedded to give insight into how security technologies are provided through these solutions
  • Assessment of market opportunities and a look at the IoT data security standards and regulations, and cost-benefit considerations for implementing security solutions
  • Outlining the demand of IoT security solutions amid rising number of cyber-attacks and considering the impact of COVID-19 pandemic outbreak and the economic halt created due to lockdown imposed in various countries
  • Profile description of leading global corporations within the IoT technologies market, including Cisco Systems Inc., ESCRYPT, Great Bay Software Inc., Inside Secure, Microsoft Corp., SecuriThings Ltd. and Thales e-Security Inc.

Table of Contents

Chapter 1 Introduction

  • Study Goals and Objectives
  • Reasons for Doing This Study
  • Scope of Report
  • Research Methodology
  • Intended Audience
  • Analyst's Credentials
  • BCC Custom Research
  • Related BCC Research Reports

Chapter 2 Summary and Highlights

Chapter 3 Market Overview

  • IoT Security Solutions: An Overview
  • Differences: IoT Security, Cyber Security and Enterprise IT Security
  • IoT Data Security Standards and Regulations
  • Current Standards for IoT Data Security
  • The Future of IoT Security
  • Technology Trends
  • IoT Security Threats
  • Types of IoT Security Threats
  • Types of IoT Security Attacks
  • Recent IoT System Security Breach Events and DDoS Attacks
  • IoT Security Solution Framework
  • Typical Architecture of an IoT Security System
  • Hardware versus Software-Based Security
  • IoT Security Considerations
  • Secure Boot
  • Session Authentication: Roots of Truth
  • Device and Data Authentication: Techniques and Standards
  • IoT Data Encryption
  • Common Techniques for Attacks
  • Public Key Infrastructure Model
  • Security at the Network Connectivity Layer
  • Securing IoT Solutions and Applications
  • Security, Management and Updating of Devices
  • Impact of COVID-19
  • Financial Impact
  • IoT Threat Landscape

Chapter 4 Market Breakdown by Type of Security

  • Introduction
  • Endpoint Security/Device Security
  • Overview
  • Techniques to Ensure a Trusted IoT Execution Cycle
  • Network Security
  • Overall
  • Wireless Connectivity Solutions for IoT Devices
  • Application Security
  • Application Security Using Code Signing (ncipher.com)
  • Cloud Security
  • Standards-Based Best Practices
  • PKI: Securing Cloud Applications
  • Cloud Access Security Brokers
  • Market Solutions for Cloud-Based Data Protection
  • Others

Chapter 5 Market Breakdown by Component

  • Introduction
  • Platforms
  • Popular IoT Security Platforms
  • Solutions
  • Identity Access Management
  • Data Encryption
  • Intrusion Prevention/Intrusion Detection Systems
  • Distributed Denial of Service (DDoS) Protection
  • Device Authentication and Management
  • Others
  • Services
  • Professional Services
  • Managed Services

Chapter 6 Market Breakdown by Organization Size

  • Introduction
  • Large Enterprises
  • SMEs

Chapter 7 Market Breakdown by End-Use Segment

  • Introduction
  • Automotive
  • Company Security Solutions
  • Healthcare
  • Company Security Solutions
  • Retail and eCommerce
  • Smart Homes
  • Company Security Solutions
  • Energy and Utilities
  • Manufacturing
  • Government Sector
  • Others
  • Media and Entertainment
  • BFSI

Chapter 8 Market Breakdown by Region

  • Introduction
  • North America
  • U.S.
  • Canada
  • Europe
  • UK
  • Germany
  • France
  • Spain
  • Asia-Pacific
  • Japan
  • China
  • India
  • The Middle East and Africa
  • Israel
  • Saudi Arabia
  • South Africa
  • South America
  • Brazil

Chapter 9 Analysis of Market Opportunities

  • IoT Challenges
  • Device Layer Security: Market Opportunities
  • Application and Cloud Layer Security: Market Opportunities
  • Network-Based Security: Market Opportunities
  • Application and Cloud Security: Market Opportunities
  • Cloud-Based Solutions
  • IoT Platforms: Market Opportunities
  • Regional Market Opportunities
  • European Market
  • Asia-Pacific Market
  • North American Market
  • Investment Opportunities: Research and Innovation

Chapter 10 Competitive Analysis

  • Overview of Patents Granted in the Market for IoT Security
  • WISeKey Patents
  • Device Authority
  • Key Market Developments

Chapter 11 Company Profiles

  • AEROHIVE
  • ARXAN
  • ARM
  • ATMEL
  • BROADSTAR INFORMATION TECHNOLOGIES
  • CENTRI TECHNOLOGY
  • CERTIFIED SECURITY SOLUTIONS INC.
  • CISCO SYSTEMS INC.
  • DEVICE AUTHORITY
  • DIGICERT INC.
  • ENTRUST DATACARD
  • ESCRYPT
  • FIREEYE
  • FORESCOUT TECHNOLOGIES INC.
  • FORGEROCK
  • GEMALTO
  • GLOBALSIGN INC.
  • GREAT BAY SOFTWARE INC.
  • ICON LABS
  • IMAGINATION TECHNOLOGIES
  • INFINEON
  • INSIDE SECURE
  • INTRINSIC-ID
  • MDS TECHNOLOGY
  • MICROCHIP TECHNOLOGY INC.
  • MICROSOFT
  • MOCANA
  • NXP SEMICONDUCTORS
  • OBERTHUR TECHNOLOGIES
  • PROTEGRITY INC.
  • PROVE AND RUN
  • RENESAS
  • RUBICON LABS
  • SECURERF
  • SECURITHINGS LTD.
  • SEQUITUR LABS INC.
  • SUREPASSID
  • SYMANTEC
  • SYNOPSYS
  • THALES E-SECURITY INC.
  • TRILLIUM
  • TRUSTONIC
  • TYFONE
  • UTIMACO
  • WISEKEY SA
  • ZINGBOX INC.

Chapter 12 Appendix: Acronyms

Back to Top
전화 문의
F A Q