株式会社グローバルインフォメーション
TEL: 044-952-0102
表紙
市場調査レポート

IoTデバイス向けハードウェアセキュリティソリューション:シリコンによるIoTセキュリティの強化

Hardware Security Solutions for IoT Devices: Strengthening IoT Security Through Silicon

発行 VDC Research Group, Inc. 商品コード 383596
出版日 ページ情報 英文 25 Pages; 10 Exhibits
納期: 即日から翌営業日
価格
本日の銀行送金レート: 1USD=112.86円で換算しております。
Back to Top
IoTデバイス向けハードウェアセキュリティソリューション:シリコンによるIoTセキュリティの強化 Hardware Security Solutions for IoT Devices: Strengthening IoT Security Through Silicon
出版日: 2016年10月31日 ページ情報: 英文 25 Pages; 10 Exhibits
概要

IoTのコネクテッドデバイスは、ますますサイバー攻撃の標的になっています。

当レポートでは、組み込みデバイス向けの様々なハードウェアベースセキュリティソリューションについて取り上げ、定義、説明、予測のほか、主要動向、主要ベンダーについて、体系的な情報を提供しています。

目次

  • 調査概要
  • エグゼクティブサマリー
  • IoTセキュリティ:ハードウェア
  • プロセッサーベースセキュリティ拡張ハードウェア
  • 信頼できるプラットフォームモジュールとその他のセキュリティコプロセッサー
  • IoT向けハードウェアセキュリティモジュールアプライアンス
  • IoT向けその他のハードウェアセキュリティソリーション
  • 結論
  • VDC Researchについて
目次

Connected devices in the Internet of Things are increasingly becoming targets of cyberattacks. OEMs working on everything from automobiles to home appliances are being forced to seek more advanced methods of securing their devices. Hardware-based security offers a number of distinct advantages over software-only solutions, and adoption is on the upswing.

This report provides definitions, descriptions, and forecasts for many types of hardware-based security solutions for embedded devices, as well as discussions of key trends and leading vendors.

What questions are addressed?

  • What are the various types of hardware security solutions applicable to embedded devices connecting to the IoT?
  • How large are the markets for these solutions and which types are growing fastest?
  • Which vertical markets have been the leading adopters of embedded hardware security, and which present the greatest opportunities going forward?
  • Which processor architectures and processor types most frequently contain internal security extension hardware?
  • In what portion of processors with internal security hardware is that hardware being utilitzed?

Table of Contents

  • Inside This Report
  • Executive Summary
  • IoT Security Is Hard(ware)
  • Processor-Based Security Extension Hardware
  • Trusted Platform Modules & Other Security Co-Processors 16
  • Hardware Security Module Appliances for IoT
  • Other Hardware Security Solutions for IoT
  • Conclusion
  • About VDC Research

LIST OF EXHIBITS

  • Exhibit 1: Markets & Technologies for IoT & Embedded Hardware Security Solutions Covered in This Report
  • Exhibit 2: Worldwide Unit Shipments of IoT & Embedded Device Processors with Security Extension Hardware
  • Exhibit 3: Processor Type Unit Share of IoT & Embedded Device Processors with Security Extension Hardware
  • Exhibit 4: Worldwide Revenue for IoT & Embedded Device Processors with Security Extension Hardware
  • Exhibit 5: Architecture Unit Share of IoT & Embedded Device Processors with Security Extension Hardware
  • Exhibit 6: Percentage of IoT & Embedded Device Processors with Security Extension Hardware Where That Security Hardware is Utilized
  • Exhibit 7: Processor Units Utilizing Security Extension Hardware, by Vertical Market
  • Exhibit 8: Worldwide Unit Shipments and Revenue for Discrete Trusted Platform Modules for IoT Devices
  • Exhibit 9: Worldwide Unit Shipments and Revenue for Other Security Co-Processor Chips for IoT Devices
  • Exhibit 10: Worldwide Unit Shipments and Revenue for Hardware Security Module Appliances for IoT Device Manufacturing and Authentication
Back to Top