Connected devices in the Internet of Things are increasingly becoming targets of cyberattacks. OEMs working on
everything from automobiles to home appliances are being forced to seek more advanced methods of securing their
devices. Hardware-based security offers a number of distinct advantages over software-only solutions, and adoption is
on the upswing.
This report provides definitions, descriptions, and forecasts for many types of hardware-based security solutions for
embedded devices, as well as discussions of key trends and leading vendors.
What questions are addressed?
- What are the various types of hardware security solutions applicable to embedded devices connecting to the IoT?
- How large are the markets for these solutions and which types are growing fastest?
- Which vertical markets have been the leading adopters of embedded hardware security, and which present the greatest opportunities going forward?
- Which processor architectures and processor types most frequently contain internal security extension hardware?
- In what portion of processors with internal security hardware is that hardware being utilitzed?
Table of Contents
- Inside This Report
- Executive Summary
- IoT Security Is Hard(ware)
- Processor-Based Security Extension Hardware
- Trusted Platform Modules & Other Security Co-Processors 16
- Hardware Security Module Appliances for IoT
- Other Hardware Security Solutions for IoT
- About VDC Research
LIST OF EXHIBITS
- Exhibit 1: Markets & Technologies for IoT & Embedded Hardware Security Solutions Covered in This Report
- Exhibit 2: Worldwide Unit Shipments of IoT & Embedded Device Processors with Security Extension Hardware
- Exhibit 3: Processor Type Unit Share of IoT & Embedded Device Processors with Security Extension Hardware
- Exhibit 4: Worldwide Revenue for IoT & Embedded Device Processors with Security Extension Hardware
- Exhibit 5: Architecture Unit Share of IoT & Embedded Device Processors with Security Extension Hardware
- Exhibit 6: Percentage of IoT & Embedded Device Processors with Security Extension Hardware Where That Security Hardware is Utilized
- Exhibit 7: Processor Units Utilizing Security Extension Hardware, by Vertical Market
- Exhibit 8: Worldwide Unit Shipments and Revenue for Discrete Trusted Platform Modules for IoT Devices
- Exhibit 9: Worldwide Unit Shipments and Revenue for Other Security Co-Processor Chips for IoT Devices
- Exhibit 10: Worldwide Unit Shipments and Revenue for Hardware Security Module Appliances for IoT Device Manufacturing and Authentication