Free Research
Contact Us
Log In / Register
Research & Data
Research & Data
By Topic
5G, Cloud & Networks
5G & 6G Cloud-Native Systems
5G Devices, Smartphones & Wearables
5G, 6G & Open RAN
Cellular Standards & Intellectual Property Rights (IPR)
Hybrid Cloud & 5G Markets
NEW
Next-Gen Hybrid Cloud Solutions
NEW
Space Technologies & Innovation
Automotive
Electric Vehicles
Smart Mobility & Automotive
Bluetooth, Wi-Fi & Short-Range Wireless
Wi-Fi, Bluetooth & Wireless Connectivity
Wi-Fi & WLAN Technologies & Markets
Cyber & Digital Security
Citizen Digital Identity
Digital Payment Technologies
OT Cybersecurity
NEW
Quantum Safe Technologies
NEW
Telco Cybersecurity
Trusted Device Solutions
IoT
IoT Hardware
IoT Markets
IoT Networks & Platforms
NEW
Sustainable Technologies
Circularity Technologies & Programs
Sustainability For Industrial Markets
Sustainability For Telco Markets
Sustainability Software Markets
Vertical Markets
Industrial & Manufacturing Markets
Industrial & Manufacturing Technologies
Smart Buildings
Smart Energy For Enterprises & Industries
Smart Urban Infrastructure
Supply Chain Management & Logistics
All Other Services
AI & Machine Learning
Consumer Technologies
Extended Reality (XR) Markets
Extended Reality (XR) Technologies
Industrial, Collaborative & Commercial Robotics
Location Technologies
Southeast Asia Digital Transformation
Packages
All Access
Data Access
ABI Research Spotlights
NEW
Vendors & Rankings
Vendors & Rankings
Competitive Rankings
Vendor Research
Consulting & Marketing
Consulting & Marketing
Content Marketing Solutions
Custom Research & Consulting Services
Data As A Service
Market Amplification Solutions
News & Resources
NEWS & RESOURCES
News & Insights
Charts & Data
Insights
Research Highlights
Blog
Company News
Media Citations
News
Webinars
Whitepapers
Videos
Innovators Network
About Us
Our Company
Leadership Team
Meet Our Analysts
About Us
Our Company
Leadership Team
Meet Our Analysts
BY TOPIC
5G, Cloud & Networks
5G & 6G Cloud-Native Systems
5G Devices, Smartphones & Wearables
5G, 6G & Open RAN
Cellular Standards & Intellectual Property Rights (IPR)
Hybrid Cloud & 5G Markets
NEW
Next-Gen Hybrid Cloud Solutions
NEW
Space Technologies & Innovation
Automotive
Electric Vehicles
Smart Mobility & Automotive
Bluetooth, Wi-Fi & Short-Range Wireless
Wi-Fi, Bluetooth & Wireless Connectivity
Wi-Fi & WLAN Technologies & Markets
Cyber & Digital Security
Citizen Digital Identity
Digital Payment Technologies
OT Cybersecurity
NEW
Quantum Safe Technologies
NEW
Telco Cybersecurity
Trusted Device Solutions
IoT
IoT Hardware
IoT Markets
IoT Networks & Platforms
NEW
Sustainable Technologies
Circularity Technologies & Programs
Sustainability For Industrial Markets
Sustainability For Telco Markets
Sustainability Software Markets
Vertical Markets
Industrial & Manufacturing Markets
Industrial & Manufacturing Technologies
Smart Buildings
Smart Energy For Enterprises & Industries
Smart Urban Infrastructure
Supply Chain Management & Logistics
All Other Services
AI & Machine Learning
Consumer Technologies
Extended Reality (XR) Markets
Extended Reality (XR) Technologies
Industrial, Collaborative & Commercial Robotics
Location Technologies
Southeast Asia Digital Transformation
ALL ACCESS
DATA ACCESS
Secure IoT On-Device Architectures
Secure IoT On-Device Architectures
Price: Starting at USD 3,000
Publish Date: 10 Jun 2021
Code: AN-5244
Research Type: Research Report
Pages: 30
Purchase
RELATED SERVICE:
OT Cybersecurity
Report Detail
Table of Contents
Companies Mentioned
Related Research
Related News
Related Insights
Purchase
Table of Contents
Companies Mentioned
Related Research
Related News
Related Insights
Purchase
Actionable Benefits
Identify optimal security architectures for various IoT devices capabilities (constrained and multi-function).
Understand end-market opportunities for on-device security solutions.
Determine appropriate business models for on-device security products and services.
Critical Questions Answered
What are the security capabilities available for different target applications and use cases?
What does the competitive landscape for secure IoT on-device architectures look like?
What is the revenue opportunity for the most mature technologies?
Research Highlights
A detailed breakdown of on-device security technologies available for IoT devices on the market today.
A comprehensive analysis of the competitive landscape and business models adopted.
The dominating Trusted Execution Environment market broken out by end market applications.
Who Should Read This?
IoT device manufacturers, silicon IP and semiconductor providers.
Software and application developers.
Security service providers (managed & cloud).
Table of Contents
1. EXECUTIVE SUMMARY
2. ASSESSING THE RISK
2.1. IoT Expansion
2.2. A Growing Threat Landscape
2.3. On-Device Approaches to Security
2.4. Securing DeviceS
3. CONSTRAINED DEVICES
3.1. Check Point Software Technologies
3.2. Karamba Security
3.3. Red Balloon Security
3.4. RunSafe Security
3.5. Sternum
3.6. Verimatrix
4. MID-RANGE AND SMART DEVICES
4.1. Trusted Execution Environments
4.2. Virtualization, Containers, and Hypervisors
4.3. Software Protection Profiles and Standards
4.4. Guidelines and Best Practices
4.5. Prove & Run
4.6. Qualcomm
4.7. SiFive
4.8. Trustonic
4.9. ZAYA
Companies Mentioned
BlackBerry
Check Point Software Technologies Ltd.
Karamba Security
Prove & Run
Qualcomm Inc
Quantum
Red Balloon Security
RunSafe Security
SiFive
Sternum
Trustonic
USA Firmware
Verimatrix
ZAYA
Related Research
Related Free Resources
Related News
IoT Tech Maturity Presents Attractive Opportunity for On-Device Security Solutions
New York, New York - June 22, 2021