½ÃÀ庸°í¼­
»óǰÄÚµå
1432877

¼¼°èÀÇ IoT º¸¾È ½ÃÀå : Á¡À¯À² ºÐ¼®, »ê¾÷ µ¿Çâ ¹× Åë°è, ¼ºÀå ¿¹Ãø(2024-2029³â)

IoT Security - Market Share Analysis, Industry Trends & Statistics, Growth Forecasts (2024 - 2029)

¹ßÇàÀÏ: | ¸®¼­Ä¡»ç: Mordor Intelligence | ÆäÀÌÁö Á¤º¸: ¿µ¹® | ¹è¼Û¾È³» : 2-3ÀÏ (¿µ¾÷ÀÏ ±âÁØ)

    
    
    




¡á º¸°í¼­¿¡ µû¶ó ÃֽŠÁ¤º¸·Î ¾÷µ¥ÀÌÆ®ÇÏ¿© º¸³»µå¸³´Ï´Ù. ¹è¼ÛÀÏÁ¤Àº ¹®ÀÇÇØ Áֽñ⠹ٶø´Ï´Ù.

IoT º¸¾È ½ÃÀå ±Ô¸ð´Â 2024³â¿¡ 66¾ï ´Þ·¯·Î ÃßÁ¤µÇ°í, 2029³â¿¡´Â 280¾ï 1,000¸¸ ´Þ·¯¿¡ À̸¦ °ÍÀ¸·Î ¿¹ÃøµÇ¸ç, ¿¹Ãø ±â°£ Áß(2024-2029³â) º¹ÇÕ ¿¬°£ ¼ºÀå·ü(CAGR) 33.53%·Î ¼ºÀåÇÒ Àü¸ÁÀÔ´Ï´Ù.

IoT Security-Market

»õ·Î¿î ¿ëµµ°ú ºñÁî´Ï½º ¸ðµ¨Àº ÀåÄ¡ ºñ¿ëÀÌ ³·¾ÆÁü¿¡ µû¶ó IoT ä¿ë·üÀ» ³ôÀ̰í ÀÖÀ¸¸ç, ÀÌ¿¡ µû¶ó Ä¿³ØÆ¼µåÄ«, ±â°è, ¹ÌÅÍ, ¿þ¾î·¯ºí, °¡Àü µîÀÇ Ä¿³ØÆ¼µå µð¹ÙÀ̽º ¼ö¿¡ ¿µÇâÀ» ¹ÌÄ¡°í ÀÖ½À´Ï´Ù.

ÁÖ¿ä ÇÏÀ̶óÀÌÆ®

  • Ä¿³ØÆ¼µå µð¹ÙÀ̽º¿¡ ´ëÇÑ ÀÇÁ¸µµ°¡ Áõ°¡ÇÔ¿¡ µû¶ó Ä¿³ØÆ¼µå µð¹ÙÀ̽ºÀÇ ¾ÈÀü¼ºÀ» È®º¸ÇÒ Çʿ䰡 ÀÖ½À´Ï´Ù. ¿¡¸¯½¼¿¡ µû¸£¸é, 2016³â¿¡ ¼¿·ê·¯·Î ¿¬°áµÈ IoT µð¹ÙÀ̽º´Â ¾à 4¾ï´ë·Î ÃßÁ¤µÇ°í, 2022³â¿¡´Â 15¾ï´ë¿¡ À̸¦ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù. ÀÌ·¯ÇÑ °ßÁ¶ÇÑ ¼ºÀåÀº ¾÷°è »ýÅÂ°è ±¸Ãà¿¡ ¾÷°è°¡ ÁÖ·ÂÇÏ°Ô µÇ¾î 3GPP ¼¿·ê·¯ IoT ±â¼úÀÇ Ç¥ÁØÈ­°¡ ÁøÇàµÉ °ÍÀ¸·Î ¹è°æÀÌ µÉ °ÍÀ¸·Î ¿¹»óµË´Ï´Ù.
  • ¿¹¸¦ µé¾î 2019³â Symantec Corp.Àº CWP(Cloud Crowd Protection) ¼Ö·ç¼Ç°ú ¾Æ¸¶Á¸ÀÇ AMZN GuardDuty¸¦ °¡´ÉÇÏ°Ô ÇÏ´Â »õ·Î¿î ¼­ºñ½º¸¦ ¹ßÇ¥ÇßÀ¸¸ç, ¾Æ¸¶Á¸ À¥ ¼­ºñ½º(AWS) ¿öÅ©·Îµå ¹× ½ºÅ丮Áö¿¡ ´ëÇÑ ÀÚµ¿ º¹±¸ Çâ»óµÈ À§Çù ÀÎÅÚ¸®Àü½º¸¦ Á¦°øÇÕ´Ï´Ù. ÀÌ »õ·Î¿î ¼­ºñ½º´Â ±â¾÷ÀÌ º¹ÀâÇÑ º¸¾È »óȲÀ» ±Øº¹ÇÏ´Â µ¥ µµ¿òÀÌ µÇ¸ç, AWS °í°´Àº Ŭ¶ó¿ìµå º¸¾ÈÀÇ Áß¿äÇÑ ±¸¼º ¿ä¼Ò¸¦ ÀÚµ¿È­Çϰí È¿À²È­ÇÒ ¼ö ÀÖÀ» °ÍÀ¸·Î ±â´ëµË´Ï´Ù.
  • µ¥ÀÌÅÍ À¯Ãâ Áõ°¡¿Í ½º¸¶Æ® ½ÃƼÀÇ ÃâÇöÀº ½ÃÀåÀ» °ßÀÎÇÏ´Â ¿äÀÎ Áß ÇϳªÀÔ´Ï´Ù.
  • ±×·¯³ª ¼÷·Ã ³ëµ¿ÀÚ ºÎÁ·°ú IoT º¸¾È ¼Ö·ç¼ÇÀÇ Á߿伺¿¡ ´ëÇÑ ÀνÄÀÌ ³·´Ù´Â ¿äÀÎÀº ½ÃÀå ¼ºÀåÀ» ¹æÇØÇϰí ÀÖ½À´Ï´Ù.

IoT º¸¾È ½ÃÀå µ¿Çâ

³×Æ®¿öÅ© º¸¾ÈÀÌ °¡Àå ºü¸¥ ¼ºÀå·üÀ» ±â·ÏÇÒ Àü¸Á

  • IoT ³×Æ®¿öÅ©´Â ¼¼°è ±â¾÷µé¿¡°Ô Áß¿äÇÑ ¸ñÇ¥ÀÌ¸ç °¡Àå Å« °ü½É»çÀÔ´Ï´Ù. ³×Æ®¿öÅ© º¸¾È ºÎ¹®Àº ¹æÈ­º®, ¼­¹ö, VPN, IDS, IPS, WIDPS, °ÔÀÌÆ®¿þÀÌ, ³×Æ®¿öÅ© Çϵå¿þ¾î µî ´Ù¾çÇÑ ÇÏÀ§ ºÎ¹®À» ´Ù·ì´Ï´Ù. ±â¾÷¿¡¼­ BYOD ¹× IoTÀÇ µµÀÔ µ¿ÇâÀÌ Áõ°¡ÇÔ¿¡ µû¶ó ±â¾÷ ³×Æ®¿öÅ©¿¡ ´ëÇÑ °ø°Ý¿¡ ´ëÇÑ º¸¾È ¿ì·Á°¡ Áõ°¡Çϰí ÀÖ½À´Ï´Ù. ¿¹¸¦ µé¾î IT Candor¿¡ µû¸£¸é 2018³âµµ ¼¼°è ³×Æ®¿öÅ© Çϵå¿þ¾î ½ÃÀå ±Ô¸ð´Â 1,810¾ï ´Þ·¯·Î Æò°¡µÇ°í ÀÖ½À´Ï´Ù. ¿£ÅÍÇÁ¶óÀÌÁî ³×Æ®¿öÅ© Çϵå¿þ¾î¿¡¼­¸¸ 520¾ï ´Þ·¯·Î Æò°¡µË´Ï´Ù.
  • IBM X-ForceÀÇ À§Çù ÀÎÅÚ¸®Àü½º º¸°í¼­¿¡ µû¸£¸é 2018³â¿¡´Â IoT Ãë¾àÁ¡ ¼ö°¡ ºÒ°ú 5³â Àü¿¡ º¸°íµÈ ¼öº¸´Ù 5,400% Áõ°¡ÇÑ °ÍÀ¸·Î ³ªÅ¸³µ½À´Ï´Ù. 2016³â¿¡ ¹ß»ýÇÑ ¹Ì¶óÀÌ °ø°ÝÀº IoT¸¦ ÀÌ¿ëÇÏ¿© ¼­¹ö¸¦ °ø°ÝÇÑ ÇöÀúÇÑ ¿¹ÀÔ´Ï´Ù. ÀÌ ¾Ç¼ºÄÚµå´Â º¿³ÝÀ» »ç¿ëÇÏ¿© 150,000´ë ÀÌ»óÀÇ ÀåÄ¡¸¦ Âü¿©½ÃŰ°í °ø±Þ¾÷ü ¼­¹ö¿¡ ÃÊ´ç 1TBÀÇ µ¥ÀÌÅ͸¦ Àü¼ÛÇß½À´Ï´Ù.
  • ÇöÀç±îÁö IoT¸¦ ÀÌ¿ëÇÑ °ø°ÝÀÇ ´ëºÎºÐÀº DDoSÀÇ ÇüÅ·Π¹ß»ýÇϰí ÀÖ½À´Ï´Ù. Symantec Corp.ÀÇ º¸°í¼­¿¡ µû¸£¸é LightAidra, Kaiten, Mirai µî 3°¡Áö DDoS °ü·Ã ¸Ö¿þ¾î°¡ 2018³â IoT °ø°ÝÀÇ 80% °¡±îÀ̸¦ Â÷ÁöÇϰí ÀÖ½À´Ï´Ù.
  • ½ÃÀåÀÇ ¸¹Àº °ø±Þ¾÷ü´Â ³×Æ®¿öÅ© º¸¾È°ú °ü·ÃµÈ ¹®Á¦¸¦ ÇØ°áÇϱâ À§ÇÑ ¼Ö·ç¼ÇÀ» Á¦°øÇÏ´Â µ¥ ÁßÁ¡À» µÓ´Ï´Ù. ¿¹¸¦ µé¾î Palo Alto Networks´Â ¹æÈ­º®À» ÅëÇÑ ÅëÇÕ ¼­ºñ½º·Î IoT º¸¾ÈÀ» Á¦°øÇÕ´Ï´Ù. ÀÌ ±â´ÉÀº Palo Alto Networks¿¡ ÀÇÇÑ ZingboxÀÇ ÃÖ±Ù Àμö ¶§¹®ÀÔ´Ï´Ù. ´Ù¾çÇÑ °ø±Þ¾÷üÀÇ ÀÌ·¯ÇÑ ³ë·ÂÀº ¿¹Ãø ±â°£ µ¿¾È ³×Æ®¿öÅ© À§ÇùÀ» ¿ÏÈ­ÇÏ°í ³×Æ®¿öÅ© º¸¾È ºÐ¾ß ½ÃÀå ¼ö¿ä¸¦ ÃËÁøÇÒ °ÍÀ¸·Î ±â´ëµË´Ï´Ù.

¾Æ½Ã¾ÆÅÂÆò¾çÀÌ °¡Àå Å« ½ÃÀå Á¡À¯À²À» Â÷Áö

  • ¾Æ½Ã¾ÆÅÂÆò¾çÀº IoTÀÇ µµÀÔÀÌ °¡Àå ÁøÇàµÇ°í ÀÖ´Â Áö¿ªÀ¸·Î, ÀÌ Áö¿ª¿¡ °Ç¼³µÈ ½º¸¶Æ® ½ÃƼ ÇÁ·ÎÁ§Æ® ¶§¹®ÀÔ´Ï´Ù. ¾Æ½Ã¾ÆÅÂÆò¾ç ´ë±Ô¸ð »ê¾÷È­¿Í ¸ð¹ÙÀÏ ÀåÄ¡ »ç¿ëÀÚ Áõ°¡µµ ÀÌ Áö¿ªÀÌ Å« ¼ºÀåÀ» ÀÌ·ê °ÍÀ¸·Î ¿¹»óµÊÀ» º¸¿©ÁÝ´Ï´Ù.
  • CiscoÀÇ VNI º¸°í¼­¿¡ µû¸£¸é 2022³â±îÁö ÀÌ Áö¿ªÀÇ ÀÎÅÍ³Ý »ç¿ëÀÚ ¼ö´Â 26¾ï ¸í(Àα¸ÀÇ 62%)ÀÌ µÇ°í 2017³â 17¾ï ¸í(Àα¸ÀÇ 41%)¿¡¼­ Áõ°¡ÇÒ ¼ö ÀÖ½À´Ï´Ù. ¶ÇÇÑ ÀÌ Áö¿ªÀÇ ³×Æ®¿öũȭµÈ ÀåÄ¡/¿¬°á ¼ö´Â 2017³â 86¾ï¿¡¼­ 2022³â±îÁö 131¾ïÀ¸·Î ÃßÁ¤µË´Ï´Ù. ±×·¯³ª ÆÄÀÌ¾î¾ÆÀÌ º¸°í¼­¿¡ µû¸£¸é ¾Æ½Ã¾ÆÅÂÆò¾çÀº ¼¼°è¿Í ºñ±³ÇÒ ¶§ °í±Þ »çÀ̹ö °ø°ÝÀÇ Ç¥ÀûÀÌ µÉ °¡´É¼ºÀÌ 35% ³ô½À´Ï´Ù.
  • Á¤º¸Åë½Å¿¬±¸±â±¸(NIICT)¿¡ µû¸£¸é IoT µð¹ÙÀ̽º¿¡ ´ëÇÑ »çÀ̹ö °ø°ÝÀº Å©°Ô Áõ°¡Çϰí ÀÖ½À´Ï´Ù. NICTÀÇ ¿¹Ãø¿¡ µû¸£¸é 2015³â¿¡´Â 150¾ï´ë¿´´ø »çÀ̹ö °ø°ÝÀÇ ¼ö´Â 2020³â¿¡´Â 300¾ï´ë¿¡ ´ÞÇÒ °¡´É¼ºÀÌ ÀÖ´Ù°í ÇÕ´Ï´Ù. ÀÌ·¯ÇÑ »ç·Ê·Î Á¤ºÎ¿Í °ü·Ã Á¶Á÷Àº ÇÇÇØ¸¦ ¿ÏÈ­Çϱâ À§ÇØ IoT º¸¾È ¼Ö·ç¼ÇÀÇ µµÀÔÀ» ÃßÁøÇϰí ÀÖ½À´Ï´Ù.
  • IoT¿¡ ´ëÇÑ Ãß¼¼°¡ ³ô¾ÆÁü¿¡ µû¶ó Áß±¹ÀÇ ±â¼ú Çõ½ÅÀº Áß±¹ ¼ÒºñÀڵ鿡 ÀÇÇÑ ½º¸¶Æ® Ȩ ½ÃÀå ¼ö¿ä Áõ°¡·Î À̾îÁö°í ÀÖ½À´Ï´Ù. ÀÌ ³ª¶óÀÇ Á᫐ ½º¸¶Æ® Ȩ ½Ã½ºÅÛÀº Á¶¸í Á¦¾î ½Ã½ºÅÛ, º¸¾È ½Ã½ºÅÛ, ¿£ÅÍÅ×ÀÎ¸ÕÆ® ½Ã½ºÅÛ(¿Àµð¿À ¹× ºñµð¿À), °¡ÀüÁ¦Ç° µîÀ¸·Î ±¸¼ºµË´Ï´Ù.

IoT º¸¾È ¾÷°è °³¿ä

IoT º¸¾È ½ÃÀåÀÇ °æÀïÀº Àû´çÇÏ¸ç ¼¼°è ½ÃÀå¿¡¼­ »ç¾÷À» Àü°³ÇÏ´Â ¼Ò¼öÀÇ Áß¿äÇÑ ½ÃÀå ±â¾÷·Î ±¸¼ºµË´Ï´Ù. ½ÃÀå Á¡À¯À² Ãø¸é¿¡¼­ ÇöÀç ÀϺΠ±â¾÷Àº ½ÃÀåÀ» µ¶Á¡Çϰí ÀÖ½À´Ï´Ù. ±×·¯³ª »ê¾÷ ¼­ºñ½º º¸¾È accessacrossÀÇ Áøº¸¿Í ÇÔ²², »õ·Î¿î ±â¾÷Àº ½ÅÈï ±¹°¡ Àüü¿¡¼­ ±×µéÀÇ ºñÁî´Ï½º ¹ßÀÚ±¹À» È®ÀåÇÏ°í ½ÃÀå¿¡¼­ÀÇ Á¸À縦 Áõ°¡Çϰí ÀÖ½À´Ï´Ù. ÀÌ ½ÃÀåÀÇ ÁÖ¿ä ±â¾÷À¸·Î´Â Symantec Corporation, IBM Corporation, Check Point Software Technologies Ltd., Intel Corporation, Hewlett Packard Enterprise Company, Cisco Systems Inc., Fortinet Inc., Trustwave Holdings, Thales Group(Gemalto NV) µîÀÌ ÀÖ½À´Ï´Ù.

  • 2019³â 9¿ù - Trustwave´Â ȸ»çÀÇ °ü¸® º¸¾È ¼­ºñ½º, Á¦Ç° ¹× ±âŸ »çÀ̹ö º¸¾È Á¦°ø Á¦Ç°ÀÇ ±â¹ÝÀÌ µÇ´Â Ŭ¶ó¿ìµå ±â¹Ý »çÀ̹ö º¸¾È Ç÷§ÆûÀ» ¹ßÇ¥Çß½À´Ï´Ù. Trustwave Fusion Ç÷§ÆûÀº µðÁöÅÐ ÀüȯÀ» ¹Þ¾ÆµéÀÌ°í ²÷ÀÓ¾øÀÌ ÁøÈ­ÇÏ´Â º¸¾È ȯ°æ¿¡ Á÷¸éÇÏ¿© ¿î¿µ¿¡ Á¾»çÇÏ´Â ±â¾÷¿¡ ´ëÀÀÇϱâ À§ÇØ ±¸ÃàµÇ¾ú½À´Ï´Ù.
  • 2019³â 6¿ù - Symantec Corp. ÁÖ½Äȸ»ç´Â Symantec Corp.ÀÇ Å¬¶ó¿ìµå ¿öÅ©·Îµå º¸È£(CWP) ¼Ö·ç¼Ç°ú Amazon Guard DutyÀÇ »õ·Î¿î ¼­ºñ½º¸¦ ¹ßÇ¥ÇÏ¿© AWS ¿öÅ©·Îµå ¹× ½ºÅ丮Áö ÀÚµ¿ º¹±¸ ¹× À§Çù ÀÎÅÚ¸®Àü½º °­È­¸¦ Á¦°øÇÕ´Ï´Ù. ÀÌ »õ·Î¿î ¼­ºñ½º´Â ±â¾÷ÀÌ º¹ÀâÇÑ º¸¾È »óȲÀ» Ž»öÇÏ¿© AWS °í°´ÀÌ Å¬¶ó¿ìµå º¸¾ÈÀÇ ÁÖ¿ä ±¸¼º ¿ä¼Ò¸¦ ÀÚµ¿È­ÇÏ°í °£¼ÒÈ­ÇÒ ¼ö ÀÖµµ·Ï ÇÕ´Ï´Ù.

±âŸ ÇýÅÃ

  • ¿¢¼¿ Çü½Ä ½ÃÀå ¿¹Ãø(ME) ½ÃÆ®
  • 3°³¿ù°£ÀÇ ¾Ö³Î¸®½ºÆ® ¼­Æ÷Æ®

¸ñÂ÷

Á¦1Àå ¼­·Ð

  • Á¶»çÀÇ ÀüÁ¦Á¶°Ç
  • Á¶»ç ¹üÀ§

Á¦2Àå Á¶»ç ¹æ¹ý

Á¦3Àå ÁÖ¿ä ¿ä¾à

Á¦4Àå ½ÃÀå ¿ªÇÐ

  • ½ÃÀå °³¿ä
  • ½ÃÀå ¼ºÀå ÃËÁø¿äÀΰú ½ÃÀå ¼ºÀå ¾ïÁ¦¿äÀÎÀÇ ¼Ò°³
  • ½ÃÀå ¼ºÀå ÃËÁø¿äÀÎ
    • µ¥ÀÌÅÍ À¯Ãâ Áõ°¡
    • ½º¸¶Æ® ½ÃƼÀÇ ÃâÇö
  • ½ÃÀå ¼ºÀå ¾ïÁ¦¿äÀÎ
    • À¯ºñÄõÅͽº ¹ýÁ¦ÀÇ ºÎÁ·°ú ´õºÒ¾î, µð¹ÙÀ̽º °£ÀÇ º¹ÀâÈ­°¡ ÁøÇàµÈ´Ù
  • ¾÷°è ¹ë·ùüÀÎ ºÐ¼®
  • ¾÷°èÀÇ ¸Å·Âµµ - Porter's Five Forces ºÐ¼®
    • ±¸¸ÅÀÚ/¼ÒºñÀÚÀÇ Çù»ó·Â
    • °ø±Þ±â¾÷ÀÇ Çù»ó·Â
    • ½Å±Ô Âü°¡¾÷üÀÇ À§Çù
    • ´ëüǰÀÇ À§Çù
    • °æÀï ±â¾÷°£ °æÀï °ü°èÀÇ °­µµ

Á¦5Àå ½ÃÀå ¼¼ºÐÈ­

  • º¸¾È À¯Çüº°
    • ³×Æ®¿öÅ© º¸¾È
    • ¿£µåÆ÷ÀÎÆ® º¸¾È
  • ¼Ö·ç¼Çº°
    • ¼ÒÇÁÆ®¿þ¾î
    • ¼­ºñ½ºº°
  • ÃÖÁ¾ »ç¿ëÀÚ »ê¾÷º°
    • ÀÚµ¿Â÷
    • ÇコÄɾî
    • Á¤ºÎ±â°ü
    • Á¦Á¶¾÷
    • ¿¡³ÊÁö ¹× Àü·Â
    • ¼Ò¸Å
    • BFSI
    • ±âŸ ÃÖÁ¾ »ç¿ëÀÚ »ê¾÷
  • Áö¿ª
    • ºÏ¹Ì
      • ¹Ì±¹
      • ij³ª´Ù
    • À¯·´
      • ¿µ±¹
      • µ¶ÀÏ
      • ÇÁ¶û½º
      • ±âŸ À¯·´
    • ¾Æ½Ã¾ÆÅÂÆò¾ç
      • Áß±¹
      • ÀϺ»
      • Àεµ
      • Çѱ¹
      • ±âŸ ¾Æ½Ã¾ÆÅÂÆò¾ç
    • ¶óƾ¾Æ¸Þ¸®Ä«
      • ¸ß½ÃÄÚ
      • ºê¶óÁú
      • ±âŸ ¶óƾ¾Æ¸Þ¸®Ä«
    • Áßµ¿ ¹× ¾ÆÇÁ¸®Ä«
      • ¾Æ¶ø¿¡¹Ì¸®Æ®(UAE)
      • »ç¿ìµð¾Æ¶óºñ¾Æ
      • ±âŸ Áßµ¿ ¹× ¾ÆÇÁ¸®Ä«

Á¦6Àå °æÀï ±¸µµ

  • ±â¾÷ ÇÁ·ÎÆÄÀÏ
    • Broadcom Inc.(Symantec Corporation)
    • IBM Corporation
    • Check Point Software Technologies Ltd.
    • Intel Corporation
    • Hewlett Packard Enterprise Co.
    • Cisco Systems Inc.
    • Fortinet Inc.
    • Trustwave Holdings
    • Thales Group(Gemalto NV)
    • AT&T Inc.
    • Palo Alto Networks Inc.

Á¦7Àå ÅõÀÚ ºÐ¼®

Á¦8Àå ½ÃÀå ±âȸ¿Í ¾ÕÀ¸·ÎÀÇ µ¿Çâ

BJH 24.03.04

The IoT Security Market size is estimated at USD 6.60 billion in 2024, and is expected to reach USD 28.01 billion by 2029, growing at a CAGR of 33.53% during the forecast period (2024-2029).

IoT Security - Market

The emerging applications and business models, coupled with the falling device costs, have been driving the adoption rate of IoT, which is, consequently, influencing the number of connected devices, such asconnected cars, machines, meters, wearable, and consumer electronics.

Key Highlights

  • Increasing dependency on the connected devices is creating the need to keep the connected device secure. According to Ericsson, it is estimated that nearly 400 million IoT devices, with cellular connections in 2016, are projected to reach 1.5 billion by 2022. This robust growth is expected to be driven by the increased industry focus on deploying a connected ecosystem and the standardization of 3GPP cellular IoT technologies.
  • In 2019, for instance, Symantec Corp. announced a new service that enables its Cloud Workload Protection (CWP) solution and AMZN GuardDuty from Amazon, to provide automated remediation and enhanced threat intelligence for Amazon Web Services (AWS) workloads and storage. This new service is anticipated to help enterprises to navigate the complex security landscape, allowing AWS customers to automate and streamline critical components of cloud security.
  • Increasing number data breaches, emergence of smart cities, are some of the factors driving the market.
  • .However, factors, such as the dearth of skilled workforce and less awareness about the importance of the IoT security solutions hinder the market growth.

IoT Security Market Trends

Network Security Is Expected to Witness the Fastest Growth Rate

  • IoT networks are the prominent targets and the primary concern for enterprises across the world. The network security segment covers various subsegments, such as firewalls, servers, VPN, IDS, IPS, WIDPS, gateway, and network hardware. The growing trend of adopting BYOD and IoTs in enterprises is increasing the security concerns of attacks on enterprise networks. For instance, according to IT Candor, the size of the global network hardware market during fiscal 2018 was valued at USD 181 billion. Enterprise network hardware alone was valued at USD 52 billion.
  • According to the IBM X-Force threat intelligence report, in 2018 it was recorded an increase of 5,400% in the number of IoT vulnerabilities over the number reported just five years earlier. Mirai attack, back in 2016, is a prominent example of using IoT to attack servers. The malware used botnet, which enlisted over 150,000 devices to send 1TB of data per second at the vendor's servers.
  • To date, the majority of the IoT based attacks have occurred in DDoS form. According to Symantec's report, three kinds of DDoS associated malware, such as LightAidra, Kaiten, and Mirai, collectively accounted for nearly 80% of the 2018 year's IoT attacks.
  • Many vendors in the market are emphasizing on providing solutions specific to tackle issues related to network security. For instance, Palo Alto Networks is delivering IoT security as an integrated service through the firewall; the capability was due to the recent acquisition of Zingbox by Palo Alto Networks.Such initiatives by various vendors are expected to mitigate the network threats over the forecast period and drive the market demand for the network security segment.

Asia-Pacific Occupies The Largest Market Share

  • Asia-Pacific is the most prominent region for the adoption of IoT, owing to smart city projects being built in the region. The massive industrialization and the rising number of mobile device users in Asia-Pacific also indicate that the region is expected to witness significant growth.
  • According to the Cisco VNI report, by 2022, the region may have 2.6 billion internet users (62% of the population), up from 1.7 billion (41% of the population) in 2017. The region is also estimated to have 13.1 billion networked devices/connections by 2022, up from 8.6 billion in 2017. Asia-Pacific, however, is 35% more likely to be targeted by advanced cyber attacks when compared to the world, according to a report by FireEye.
  • According to the National Institute of Information and Communication Technology (NIICT), there has been a significant increase in the number of cyberattacks to IoT Devices. NICT predicts that the number of cyberattacks may reach 30 billion devices by 2020, when compared to 15 billion devices in 2015. Such instances are propelling the government and the related organizations to deploy IoT security solutions to mitigate the damages.
  • With a rising trend toward IoT, China's technological innovation has led to increasing demand in the smart home market from Chinese consumers. The country's central smart home systems consist of lighting control systems, security systems, entertainment systems (audio and video), home appliances, and others.

IoT Security Industry Overview

The IoT Securitymarket is moderately competitive and consists of a few significant market players operating across the globalmarket. In terms of market share, some of theplayers currently dominate the market. However, with the advancement in the security accessacross the industrialservices, new players are increasing their market presence thereby expanding their business footprint across the emerging economies. Some of the key players in the market areSymantec Corporation, IBM Corporation, Check Point Software Technologies Ltd.,Intel Corporation,Hewlett Packard Enterprise Company,Cisco Systems Inc.,Fortinet Inc.,Trustwave Holdings,Thales Group (Gemalto NV), among others.

  • Sept 2019-Trustwave announced a cloud-based cybersecurity platform that serves as the foundation for the company's managed security services, products and other cybersecurity offerings. The Trustwave Fusion platform is purpose-built to meet the enterprise, where it is involved in operations as it embraces digital transformation and contend with a continuously evolving security landscape.
  • June 2019 -Symantec Corp.announced a new service for Symantec's Cloud Workload Protection (CWP) solution and Amazon Guard Duty to provide automated remediation and enhanced threat intelligence for AWS workloads and storage. This new service will help enterprises to navigate the complex security landscape, allowing AWS customers to automate and streamline key components of cloud security.

Additional Benefits:

  • The market estimate (ME) sheet in Excel format
  • 3 months of analyst support

TABLE OF CONTENTS

1 INTRODUCTION

  • 1.1 Study Assumptions
  • 1.2 Scope of the Study

2 RESEARCH METHODOLOGY

3 EXECUTIVE SUMMARY

4 MARKET DYNAMICS

  • 4.1 Market Overview
  • 4.2 Introduction to Market Drivers and Restraints
  • 4.3 Market Drivers
    • 4.3.1 Increasing Number of Data Breaches
    • 4.3.2 Emergence of Smart Cities
  • 4.4 Market Restraints
    • 4.4.1 Growing Complexity among Devices, Coupled with the Lack of Ubiquitous Legislation
  • 4.5 Industry Value Chain Analysis
  • 4.6 Industry Attractiveness - Porter's Five Force Analysis
    • 4.6.1 Bargaining Power of Buyers/Consumers
    • 4.6.2 Bargaining Power of Suppliers
    • 4.6.3 Threat of New Entrants
    • 4.6.4 Threat of Substitute Products
    • 4.6.5 Intensity of Competitive Rivalry

5 MARKET SEGMENTATION

  • 5.1 By Type of Security
    • 5.1.1 Network Security
    • 5.1.2 End-point Security
  • 5.2 By Solution
    • 5.2.1 Software
    • 5.2.2 Services
  • 5.3 By End-user Industry
    • 5.3.1 Automotive
    • 5.3.2 Healthcare
    • 5.3.3 Government
    • 5.3.4 Manufacturing
    • 5.3.5 Energy & power
    • 5.3.6 Retail
    • 5.3.7 BFSI
    • 5.3.8 Others End-user Industries
  • 5.4 Geography
    • 5.4.1 North America
      • 5.4.1.1 United States
      • 5.4.1.2 Canada
    • 5.4.2 Europe
      • 5.4.2.1 United Kingdom
      • 5.4.2.2 Germany
      • 5.4.2.3 France
      • 5.4.2.4 Rest of Europe
    • 5.4.3 Asia-Pacific
      • 5.4.3.1 China
      • 5.4.3.2 Japan
      • 5.4.3.3 India
      • 5.4.3.4 South Korea
      • 5.4.3.5 Rest of Asia-Pacific
    • 5.4.4 Latin America
      • 5.4.4.1 Mexico
      • 5.4.4.2 Brazil
      • 5.4.4.3 Rest of Latin America
    • 5.4.5 Middle East & Africa
      • 5.4.5.1 United Arab Emirates
      • 5.4.5.2 Saudi Arabia
      • 5.4.5.3 Rest of Middle-East & Africa

6 COMPETITIVE LANDSCAPE

  • 6.1 Company Profiles
    • 6.1.1 Broadcom Inc. (Symantec Corporation)
    • 6.1.2 IBM Corporation
    • 6.1.3 Check Point Software Technologies Ltd.
    • 6.1.4 Intel Corporation
    • 6.1.5 Hewlett Packard Enterprise Co.
    • 6.1.6 Cisco Systems Inc.
    • 6.1.7 Fortinet Inc.
    • 6.1.8 Trustwave Holdings
    • 6.1.9 Thales Group (Gemalto NV)
    • 6.1.10 AT&T Inc.
    • 6.1.11 Palo Alto Networks Inc.

7 INVESTMENT ANALYSIS

8 MARKET OPPORTUNITIES AND FUTURE TRENDS

»ùÇà ¿äû ¸ñ·Ï
0 °ÇÀÇ »óǰÀ» ¼±Åà Áß
¸ñ·Ï º¸±â
Àüü»èÁ¦