Identify optimal Internet of Things (IoT) applications for secure processors.
Develop security features for IoT edge devices.
Leverage security Intellectual Property (IP) to deliver trusted applications on devices and in the cloud.
Critical Questions Answered
What are the security demands and challenges for high-end IoT edge devices?
How is security in processor technology converging along the various form factors (Microprocessor Units (MPU) and Microcontroller Units (MCUs)) and what are their differentiators?
Who are the primary ecosystem players in secure processor technology for IoT edge devices?
Research Highlights
Security technology developments for security IP, MPUs, and their enablement of secure applications and cloud services.
Vendor ecosystem overview of primary players in the secure processor market for IoT edge.
Global Total Addressable Market (TAM) forecast for Trusted Execution Environment (TEE) Systems-on-Chip (SoCs) for mobile and IoT devices.
Who Should Read This?
Product developers and engineers at silicon IP and semiconductor vendors and chipset manufacturers.
Security decision makers at IoT OEMs.
Application developers and connectivity providers.