物聯網(IoT)安全:技術及全球市場
市場調查報告書
商品編碼
1177483

物聯網(IoT)安全:技術及全球市場

Internet of Things (IoT) Security: Technologies and Global Markets

出版日期: | 出版商: BCC Research | 英文 251 Pages | 訂單完成後即時交付

價格

全球物聯網(IoT)安全的市場規模,2022年有望成為241億美元。該市場,在2022年~2027年的預測期間內預計以24.8%的年複合成長率擴大,2027年達到728億美元。

本報告提供全球IoT安全市場相關調查,市場概要,以及各主要市場區隔,各部署,各組織規模,各安全類型,各終端用戶業界,各地區的趨勢,及加入此市場的主要企業簡介等資訊。

目錄

第1章 簡介

第2章 彙整和亮點

第3章 市場概要與技術背景

  • 概要
  • 各點:IoT安全,網路安全,企業IT安全
  • IoT資料安全的標準與法規
  • IoT安全的未來
  • IoT安全的威脅
  • IoT安全解決方案組成架構
  • IoT安全技術的演進
  • 價值鏈分析
  • IoT安全技術市場相關波特的五力分析
  • COVID-19對市場的影響
  • 俄羅斯、烏克蘭戰爭對市場的影響

第4章 市場動態

  • 市場動態
    • 促進因素
    • 阻礙因素
    • 機會
    • 課題

第5章 市場明細,各主要市場區隔

  • 概要
  • IoT安全解決方案
  • IoT安全平台
  • IoT安全服務

第6章 市場明細,各部署

  • 概要
  • 雲端
  • 內部部署

第7章 市場明細,各組織規模

  • 概要
  • 大企業
  • 中小企業

第8章 市場明細,各安全類型

  • 概要
  • 終端安全
  • 網路安全
  • 應用安全
  • 雲端安全
  • 其他

第9章 市場明細,各終端用戶業界

  • 概要
  • 製造業
  • 汽車與運輸
  • 能源和公共事業
  • 醫療保健
  • 政府
  • 零售
  • BFSI
  • 建築物基礎設施
  • 其他

第10章 市場明細,各地區

  • 概要
  • 北美
  • 歐洲
  • 亞太地區
  • 其他地區

第11章 競爭情形

  • 龍頭企業
  • 策略分析

第12章 企業簡介

  • AEROHIVE(EXTREME NETWORKS)
  • ALLOT
  • AMAZON WEB SERVICES INC.(AMAZON.COM INC.)
  • ARM
  • ARMIS INC.
  • ARXAN TECHNOLOGIES INC.(DIGITAL.AI)
  • ATOS SE
  • CENTRI TECHNOLOGY(AGILEPQ)
  • CERTIFIED SECURITY SOLUTIONS INC.
  • CISCO SYSTEMS INC.
  • DIGICERT INC.
  • ENTRUST DATACARD
  • ERICSSON
  • ESCRYPT
  • FIREEYE
  • FORGEROCK INC.
  • FORESCOUT TECHNOLOGIES INC.
  • FORTINET INC.
  • GLOBALSIGN INC.
  • GREAT BAY SOFTWARE INC.(PLIXER LLC.)
  • ICON LABS(SECTIGO LTD.)
  • IDEMIA
  • IMAGINATION TECHNOLOGIES
  • INTRINSIC ID
  • INFINEON TECHNOLOGIES AG
  • INTEL CORP.
  • KARAMBA SECURITY LTD.
  • MDS TECHNOLOGY
  • MICROCHIP TECHNOLOGY INC.
  • MICROSOFT CORP.
  • NXP SEMICONDUCTORS
  • PALO ALTO NETWORKS INC.
  • PROTEGRITY INC.
  • PROVENRUN
  • RENESAS
  • RUBICON LABS
  • SECURITHINGS LTD.
  • SEQUITUR LABS INC.
  • SUREPASSID
  • SYMANTEC(BROADCOM INC.)
  • SYNOPSYS
  • THALES
  • TRUSTONIC
  • TYFONE
  • UTIMACO
  • VERIDIFY SECURITY INC.(SECURERF)
  • VERIMATRIX
  • VERIZON COMMUNICATIONS INC.
  • WISEKEY SA

第13章 附錄:縮寫

Product Code: IFT134C

Highlights:

The global IoT security technologies market should reach $24.1 billion by 2022 and $72.8 billion by 2027, with a compound annual growth rate (CAGR) of 24.8% during the forecast period of 2022-2027.

Manufacturing segment of the global IoT security technologies market should reach $8.1 billion by 2022 and $24.3 billion by 2027, with a CAGR of 24.4% during the forecast period of 2022-2027.

Energy and utility segment of the global IoT security technologies market should reach $3.4 billion by 2022 and $12.2 billion by 2027, with a CAGR of 29% during the forecast period of 2022-2027.

Report Scope:

The report provides an overview of the global IoT security technologies market and analyzes market trends. Using 2021 as the base year, the report provides estimated market data for 2022 through 2027. Revenue forecasts for this period are segmented based on component, deployment, organization size, security type, end-user, and region. The report also focuses on the major driving trends and challenges that affect the market. The report concludes with detailed profiles of the major global IoT security technology market players.

Report Includes:

  • 78 data tables and 43 additional tables
  • A detailed overview and up-to-date analysis of the global markets for IoT security technologies
  • Analyses of the global market trends, with market revenue data for 2021, estimates for 2022 and 2023, and projections of compound annual growth rates (CAGRs) through 2027
  • Estimation of the actual market size and revenue forecast for global IoT security technologies market, and the corresponding market share analysis based on component, type of security, deployment, organization size, application, and geographic region
  • Insight into the various IoT solutions and different security features embedded to give insight into how security technologies are provided through these solutions
  • Updated information on market drivers and opportunities, key shifts and industry specific challenges, and a look at the IoT data security standards and regulations, and cost-benefit considerations for implementing security solutions
  • Discussion of the industry value chain analysis for IoT security technologies market providing a systematic study of key intermediaries involved, with emphasis on solutions and service providers and major types of end-use industries across different regions
  • Identification of the major stakeholders and analysis of the competitive landscape based on recent developments and segmental revenues
  • Review of key patent grants and significant allotments of recent patents across each major category
  • Company profiles of major players within the industry, including Amazon Web Services Inc., Cisco Systems Inc., Ericsson, Intel Corp., Microsoft Corp., and Verizon Communications Inc.

Table of Contents

Chapter 1 Introduction

  • 1.1 Overview
  • 1.2 Study Goals and Objectives
  • 1.3 Reasons for Doing This Study
  • 1.4 What's New in this Update?
  • 1.5 Scope of Report
  • 1.6 Information Sources
  • 1.7 Methodology
  • 1.8 Intended Audience
  • 1.9 Geographic Breakdown
  • 1.10 Analyst's Credentials
  • 1.11 BCC Custom Research
  • 1.12 Related BCC Research Reports

Chapter 2 Summary and Highlights

Chapter 3 Market Overview and Technology Background

  • 3.1 Overview
  • 3.2 Differences: IoT Security, Cyber Security, and Enterprise IT Security
    • 3.2.1 Cost-Benefit Considerations
  • 3.3 IoT Data Security Standards and Regulations
    • 3.3.1 Current Standards for IoT Data Security
  • 3.4 Future of IoT Security
    • 3.4.1 Technology Trends
  • 3.5 IoT Security Threats
    • 3.5.1 Types of IoT Security Threats
    • 3.5.2 Types of IoT Security Attacks
    • 3.5.3 Recent IoT System Security Breach Events and DDoS Attacks
  • 3.6 IoT Security Solution Framework
    • 3.6.1 Typical Architecture of an IoT Security System
    • 3.6.2 Hardware versus Software-Based Security
    • 3.6.3 IoT Security Considerations
    • 3.6.4 Secure Boot
    • 3.6.5 Session Authentication: Roots of Truth
    • 3.6.6 Device and Data Authentication: Techniques and Standards
    • 3.6.7 IoT Data Encryption
    • 3.6.8 Common Techniques for Attacks
    • 3.6.9 Public Key Infrastructure Model
    • 3.6.10 Security at the Network Connectivity Layer
    • 3.6.11 Securing IoT Solutions and Applications
    • 3.6.12 Security, Management, and Updating of Devices
  • 3.7 Evolution of IoT Security Technology
  • 3.8 Value Chain Analysis
  • 3.9 Porter's Five Forces Analysis of the Market for IoT Security Technologies
    • 3.9.1 Supplier Bargaining Power
    • 3.9.2 Buyers Bargaining Power
    • 3.9.3 Threat of New Entrants
    • 3.9.4 Competitive Rivalry
    • 3.9.5 Threat of Substitutes
  • 3.10 Impact of COVID-19 on the Market
    • 3.10.1 Positive Impact
  • 3.11 Impact of Russia-Ukraine War on the Market
    • 3.11.1 Negative Impact
    • 3.11.2 Positive Impact

Chapter 4 Market Dynamics

  • 4.1 Market Dynamics
    • 4.1.1 Drivers
    • 4.1.2 Restraints
    • 4.1.3 Opportunities
    • 4.1.4 Challenges

Chapter 5 Market Breakdown by Major Segment

  • 5.1 Overview
  • 5.2 IoT Security Solutions
    • 5.2.1 Device Authentication and Management
    • 5.2.2 Identity Access Management
    • 5.2.3 Distributed Denial of Service Protection
    • 5.2.4 Public Key Infrastructure Lifestyle Management
    • 5.2.5 Data Encryption and Tokenization
    • 5.2.6 Intrusion Detection System and Intrusion Prevention System
    • 5.2.7 Secure Communication
    • 5.2.8 Security Analytics
    • 5.2.9 Others
  • 5.3 IoT Security Platforms
    • 5.3.1 Popular IoT Platforms
  • 5.4 IoT Security Services
    • 5.4.1 Professional Services
    • 5.4.2 Managed Services

Chapter 6 Market Breakdown by Deployment

  • 6.1 Overview
  • 6.2 Cloud
  • 6.3 On-premises

Chapter 7 Market Breakdown by Organization Size

  • 7.1 Overview
  • 7.2 Large Enterprises
  • 7.3 Small and Medium Size Enterprises
    • 7.3.1 Process Optimization
    • 7.3.2 Predictive Maintenance
    • 7.3.3 Customer Management
    • 7.3.4 Real-Time Monitoring

Chapter 8 Market Breakdown by Type of Security

  • 8.1 Overview
  • 8.2 Endpoint Security
  • 8.3 Network Security
    • 8.3.1 Solutions for IoT Network Connectivity Security
    • 8.3.2 Technology Overview for Firewalls and IoT Gateways
    • 8.3.3 IoT Gateways and Edge Firewalls as Security Solutions
  • 8.4 Application Security
    • 8.4.1 Application Security Using Code Signing
  • 8.5 Cloud Security
    • 8.5.1 Standards-Based Best Practices
    • 8.5.2 PKI: Securing Cloud Applications
    • 8.5.3 Cloud Access Security Brokers
    • 8.5.4 Market Solutions for Cloud-Based Data Protection
  • 8.6 Others

Chapter 9 Market Breakdown by End-User Industry

  • 9.1 Overview
  • 9.2 Manufacturing
    • 9.2.1 Connected Products
    • 9.2.2 Connected Production
    • 9.2.3 Supply Chain
    • 9.2.4 Predictive Maintenance
  • 9.3 Automotive and Transportation
    • 9.3.1 Fleet Management and Telematics
    • 9.3.2 Connected Cars
    • 9.3.3 Automotive Maintenance System
  • 9.4 Energy and Utilities
  • 9.5 Healthcare
    • 9.5.1 Remote Health Monitoring
    • 9.5.2 Smart Hospital
    • 9.5.3 Medical Asset Management
    • 9.5.4 Healthcare Staff Management
  • 9.6 Government
  • 9.7 Retail
    • 9.7.1 Consumer Satisfaction
    • 9.7.2 Logistics
    • 9.7.3 Inventory Management
    • 9.7.4 Facility Management and Consumer Behavior Analysis
    • 9.7.5 Supply Chain
    • 9.7.6 Smart Shelves
    • 9.7.7 Smart Digital Signage
    • 9.7.8 Smart Vending Machines
  • 9.8 BFSI
  • 9.9 Building Infrastructure
  • 9.10 Others

Chapter 10 Market Breakdown by Region

  • 10.1 Overview
  • 10.2 North America
    • 10.2.1 United States
    • 10.2.1 Canada
  • 10.3 Europe
    • 10.3.1 United Kingdom
    • 10.3.2 Germany
    • 10.3.3 France
    • 10.3.4 Italy
    • 10.3.5 Rest of Europe
  • 10.4 Asia-Pacific
    • 10.4.1 China
    • 10.4.2 Japan
    • 10.4.3 India
    • 10.4.4 South Korea
    • 10.4.5 Rest of Asia-Pacific
  • 10.5 Rest of the World
    • 10.5.1 South America
    • 10.5.2 Middle East and Africa

Chapter 11 Competitive Landscape

  • 11.1 Top Companies
  • 11.2 Strategic Analysis
    • 11.2.1 Product Innovations
    • 11.2.2 Partnerships and Acquisitions

Chapter 12 Company Profiles

  • AEROHIVE (EXTREME NETWORKS)
  • ALLOT
  • AMAZON WEB SERVICES INC. (AMAZON.COM INC.)
  • ARM
  • ARMIS INC.
  • ARXAN TECHNOLOGIES INC. (DIGITAL.AI)
  • ATOS SE
  • CENTRI TECHNOLOGY (AGILEPQ)
  • CERTIFIED SECURITY SOLUTIONS INC.
  • CISCO SYSTEMS INC.
  • DIGICERT INC.
  • ENTRUST DATACARD
  • ERICSSON
  • ESCRYPT
  • FIREEYE
  • FORGEROCK INC.
  • FORESCOUT TECHNOLOGIES INC.
  • FORTINET INC.
  • GLOBALSIGN INC.
  • GREAT BAY SOFTWARE INC. (PLIXER LLC.)
  • ICON LABS (SECTIGO LTD.)
  • IDEMIA
  • IMAGINATION TECHNOLOGIES
  • INTRINSIC ID
  • INFINEON TECHNOLOGIES AG
  • INTEL CORP.
  • KARAMBA SECURITY LTD.
  • MDS TECHNOLOGY
  • MICROCHIP TECHNOLOGY INC.
  • MICROSOFT CORP.
  • NXP SEMICONDUCTORS
  • PALO ALTO NETWORKS INC.
  • PROTEGRITY INC.
  • PROVENRUN
  • RENESAS
  • RUBICON LABS
  • SECURITHINGS LTD.
  • SEQUITUR LABS INC.
  • SUREPASSID
  • SYMANTEC (BROADCOM INC.)
  • SYNOPSYS
  • THALES
  • TRUSTONIC
  • TYFONE
  • UTIMACO
  • VERIDIFY SECURITY INC. (SECURERF)
  • VERIMATRIX
  • VERIZON COMMUNICATIONS INC.
  • WISEKEY SA

Chapter 13 Appendix: Acronyms

List of Tables

  • Summary Table : Global Market for IoT Security Technologies, by End-User Industry, Through 2027
  • Table 1 : Key Technology Trends: IoT Security Solutions Segment
  • Table 2 : IoT Security Technology Evolution Timeline: Overview
  • Table 3 : Porter's Five Forces Analysis: Overview
  • Table 4 : Destructive Cyberattacks in Ukraine, February 2022 to April 2022
  • Table 5 : Global Market for IoT Security Technologies, by Major Segment, Through 2027
  • Table 6 : Global Market for IoT Security Technology, by Solution, Through 2027
  • Table 7 : Global Market for IoT Device Authentication and Management Solutions, by Region, Through 2027
  • Table 8 : Functions of IA
  • Table 9 : Global Market for IoT Identity Access Management Solutions, by Region, Through 2027
  • Table 10 : Open Systems Interconnection (OSI) Model
  • Table 11 : Global Market for IoT Distributed Denial of Service Protection Solutions, by Region, Through 2027
  • Table 12 : Global Market for IoT Public Key Infrastructure Lifestyle Management Solutions, by Region, Through 2027
  • Table 13 : Global Market for IoT Data Encryption and Tokenization Solutions, by Region, Through 2027
  • Table 14 : Global Market for IoT Intrusion Detection System and Intrusion Prevention System Solutions, by Region, Through 2027
  • Table 15 : Global Market for IoT Secure Communication Solutions, by Region, Through 2027
  • Table 16 : Global Market for IoT Security Analytics Solutions, by Region, Through 2027
  • Table 17 : Global Market for Other IoT Security Solutions, by Region, Through 2027
  • Table 18 : Global Market for IoT Security Solutions, by Region, Through 2027
  • Table 19 : Global Market for IoT Security Platforms, by Region, Through 2027
  • Table 20 : Global Market for IoT Security Services, by Region, Through 2027
  • Table 21 : Global Market for IoT Security Technologies, by Deployment, Through 2027
  • Table 22 : Global Market for Cloud Deployment of IoT Security Technologies, by Region, Through 2027
  • Table 23 : Global Market for On-premise Deployment of IoT Security Technologies, by Region, Through 2027
  • Table 24 : Global Market for IoT Security Technologies, by Organization Size, Through 2027
  • Table 25 : Global Market for IoT Security Technologies in Large Enterprises, by Region, Through 2027
  • Table 26 : Global Market for IoT Security Technologies in Small and Medium Size Enterprises, by Region, Through 2027
  • Table 27 : Global Market for IoT Security Technologies, by Type of Security, Through 2027
  • Table 28 : Global Market for IoT Endpoint Security, by Region, Through 2027
  • Table 29 : Global Market for IoT Network Security, by Region, Through 2027
  • Table 30 : Global Market for IoT Application Securities, by Region, Through 2027
  • Table 31 : Global Market for IoT Cloud Security, by Region, Through 2027
  • Table 32 : Global Market for IoT in Other Types of Security, by Region, Through 2027
  • Table 33 : Global Market for IoT Security Technologies, by End-User Industry, Through 2027
  • Table 34 : Global Market for IoT Security Technology in the Manufacturing Industry, by Region, Through 2027
  • Table 35 : Potential Vulnerabilities in Connected Car
  • Table 36 : Global Market for IoT Security Technology in the Automotive and Transportation Industry, by Region, Through 2027
  • Table 37 : List of IoT Uses in Energy and Utilities
  • Table 38 : Global Market for IoT Security Technology in the Energy and Utilities Industry, by Region, Through 2027
  • Table 39 : Global Market for IoT Security Technology in the Healthcare Industry, by Region, Through 2027
  • Table 40 : Global Market for IoT Security Technology in the Government Sector, by Region, Through 2027
  • Table 41 : Global Market for IoT Security Technology in the Retail Industry, by Region, Through 2027
  • Table 42 : Global Market for IoT Security Technology in the BFSI Industry, by Region, Through 2027
  • Table 43 : Global Market for IoT Security Technology in the Buildings Infrastructure Industry, by Region, Through 2027
  • Table 44 : Global Market for IoT Security Technology in Other End-User Industries, by Region, Through 2027
  • Table 45 : Global Market for IoT Security Technologies, by Region, Through 2027
  • Table 46 : North American Market for IoT Security Technologies, by Country, Through 2027
  • Table 47 : North American Market for IoT Security Technologies, by Major Segment, Through 2027
  • Table 48 : North American Market for IoT Security Technologies, by Solution, Through 2027
  • Table 49 : North American Market for IoT Security Technologies, by Deployment, Through 2027
  • Table 50 : North American Market for IoT Security Technologies, by Organization Size, Through 2027
  • Table 51 : North American Market for IoT Security Technologies, by Type of Security, Through 2027
  • Table 52 : North American Market for IoT Security Technologies, by End-User Industry, Through 2027
  • Table 53 : European Market for IoT Security Technologies, by Country, Through 2027
  • Table 54 : European Market for IoT Security Technologies, by Major Segment, Through 2027
  • Table 55 : European Market for IoT Security Technologies, by Solution, Through 2027
  • Table 56 : European Market for IoT Security Technologies, by Deployment, Through 2027
  • Table 57 : European Market for IoT Security Technologies, by Organization Size, Through 2027
  • Table 58 : European Market for IoT Security Technologies, by Type of Security, Through 2027
  • Table 59 : European Market for IoT Security Technologies, by End-User Industry, Through 2027
  • Table 60 : APAC Market for IoT Security Technologies, by Country, Through 2027
  • Table 61 : APAC Market for IoT Security Technologies, by Major Segment, Through 2027
  • Table 62 : APAC Market for IoT Security Technologies, by Solution, Through 2027
  • Table 63 : APAC Market for IoT Security Technologies, by Deployment, Through 2027
  • Table 64 : APAC Market for IoT Security Technologies, by Organization Size, Through 2027
  • Table 65 : APAC Market for IoT Security Technologies, by Type of Security, Through 2027
  • Table 66 : APAC Market for IoT Security Technologies, by End-User Industry, Through 2027
  • Table 67 : Rest of the World Market for IoT Security Technologies, by Subregion, Through 2027
  • Table 68 : Rest of the World Market for IoT Security Technologies, by Major Segment, Through 2027
  • Table 69 : Rest of the World Market for IoT Security Technologies, by Solution, Through 2027
  • Table 70 : Rest of the World Market for IoT Security Technologies, by Deployment, Through 2027
  • Table 71 : Rest of the World Market for IoT Security Technologies, by Organization Size, Through 2027
  • Table 72 : Rest of the World Market for IoT Security Technologies, by Type of Security, Through 2027
  • Table 73 : Rest of the World Market for IoT Security Technologies, by End-User Industry, Through 2027
  • Table 74 : Top 4 Players in the Global Market for IoT Security Technologies, 2022
  • Table 75 : Product Innovations in the Global Market for IoT Security Technologies, January 2021 to October 2022
  • Table 76 : Partnerships and Acquisitions in the Global Market for IoT Security Technologies, March 2021 to August 2022
  • Table 77 : Collaborations, Alliance, and Expansion in the Global Market for IoT Security Technologies, May 2021 to October 2022
  • Table 78 : Allot: IoT Security Offerings
  • Table 79 : Allot: Recent Developments, 2021 and 2022
  • Table 80 : Amazon.com Inc.: Recent Financial Performance, 2019-2021
  • Table 81 : Amazon Web Services Inc.: IoT Security Offerings
  • Table 82 : Amazon Web Services Inc.: Recent Developments, 2021 and 2022
  • Table 83 : Armis Inc.: IoT Security Offerings
  • Table 84 : Armis Inc.: Recent Developments, 2021 and 2022
  • Table 85 : Atos SE: Recent Financial Performance, 2019-2021
  • Table 86 : Atos SE: IoT Security Offerings
  • Table 87 : Atos SE: Recent Developments, 2021
  • Table 88 : Cisco Systems Inc.: Recent Financial Performance, FY 2020-FY 2022
  • Table 89 : Cisco Systems Inc.: IoT Security Offerings
  • Table 90 : Cisco Systems Inc.: Recent Developments, 2022
  • Table 91 : Ericsson: Recent Financial Performance, FY 2019-FY 2021
  • Table 92 : Ericsson: IoT Security Offerings
  • Table 93 : Ericsson: Recent Developments, 2021 and 2022
  • Table 94 : ForgeRock Inc.: Recent Financial Performance, 2019-2021
  • Table 95 : ForgeRock Inc.: IoT Security Offerings
  • Table 96 : ForgeRock Inc.: Recent Developments, 2022
  • Table 97 : Fortinet Inc.: Recent Financial Performance, FY 2019-FY 2021
  • Table 98 : Fortinet Inc.: IoT Security Offerings
  • Table 99 : Fortinet Inc.: Recent Developments, 2021 and 2022
  • Table 100 : Infineon Technologies AG: Recent Financial Performance, FY 2019-FY 2021
  • Table 101 : Infineon: IoT Security Offerings
  • Table 102 : Infineon: Recent Developments, 2022
  • Table 103 : Intel Corp.: Recent Financial Performance, FY 2019-FY 2021
  • Table 104 : Intel Corp.: IoT Security Offerings
  • Table 105 : Intel Corp.: Recent Developments, 2021 and 2022
  • Table 106 : Karamba Security Ltd.: IoT Security Offerings
  • Table 107 : Karamba Security Ltd.: Recent Developments, 2021 and 2022
  • Table 108 : Microsoft Corp.: Recent Financial Performance, FY 2020 and FY 2022
  • Table 109 : Microsoft Corp.: IoT Security Offerings
  • Table 110 : Microsoft Corp.: Recent Developments, 2021 and 2022
  • Table 111 : Palo Alto Networks Inc.: Recent Financial Performance, FY 2019-FY 2021
  • Table 112 : Palo Alto Networks Inc.: IoT Security Offerings
  • Table 113 : Palo Alto Networks Inc.: Recent Developments, 2021 and 2022
  • Table 114 : Thales Group: Recent Financial Performance, FY 2019-FY 2021
  • Table 115 : Thales: IoT Security Technology Offerings
  • Table 116 : Thales: Recent Developments, 2021 and 2022
  • Table 117 : Verizon Communications Inc.: Recent Financial Performance, FY 2019-FY 2021
  • Table 118 : Verizon Communications Inc.: IoT Security Offerings
  • Table 119 : Verizon Communications Inc.: Recent Developments, 2021
  • Table 120 : Major Acronyms Used in This Report

List of Figures

  • Summary Figure : Global Market for IoT Security Technologies, 2021-2027
  • Figure 1 : Typical Architecture for IoT Systems and Security Layers
  • Figure 2 : Market for IoT Security Technologies: Value Chain Analysis
  • Figure 3 : Porter's Five Forces Analysis: Global Market for IoT Security Technologies
  • Figure 4 : IoT Security Technology Market: Supplier Bargaining Power
  • Figure 5 : IoT Security Technology Market: Buyer's Bargaining Power
  • Figure 6 : IoT Security Technology Market: Threat of New Entrants
  • Figure 7 : IoT Security Technology Market: Competitive Rivalry
  • Figure 8 : IoT Security Technology Market: Threat of Substitutes
  • Figure 9 : Average Cost of IoT Sensors, 2004-2020
  • Figure 10 : Global Number of Identified Customers in Major Industries Deploying Private Mobile Networks in Trials and Commercially, as of 2021
  • Figure 11 : Global Market Shares of IoT Security Technologies, by Major Segment, 2021
  • Figure 12 : Global Market Shares of IoT Security Technologies, by Solution, 2021
  • Figure 13 : Global Market Shares of IoT Device Authentication and Management Solutions, by Region, 2021
  • Figure 14 : Global Market Shares of IoT Identity Access Management Solutions, by Region, 2021
  • Figure 15 : Global Market Shares of IoT Distributed Denial of Service Protection Solutions, by Region, 2021
  • Figure 16 : Global Market Shares of IoT Public Key Infrastructure Lifestyle Management Solutions, by Region, 2021
  • Figure 17 : Public-Key Cryptography Process
  • Figure 18 : Global Market Shares of IoT Data Encryption and Tokenization Solutions, by Region, 2021
  • Figure 19 : Global Market Shares of IoT Intrusion Detection System and Intrusion Prevention System Solutions, by Region, 2021
  • Figure 20 : Global Market Shares of IoT Secure Communication Solutions, by Region, 2021
  • Figure 21 : Global Market Shares of IoT Security Analytics Solutions, by Region, 2021
  • Figure 22 : Global Market Shares of Other IoT Security Solutions, by Region, 2021
  • Figure 23 : Global Market Shares of IoT Security Solutions, by Region, 2021
  • Figure 24 : Global Market Shares of IoT Security Platforms, by Region, 2021
  • Figure 25 : Global Market Shares of IoT Security Services, by Region, 2021
  • Figure 26 : Global Market Shares of IoT Security Technologies, by Deployment, 2021
  • Figure 27 : Global Market Shares of Cloud Deployment of IoT Security Technologies, by Region, 2021
  • Figure 28 : Global Market Shares of On-premise Deployment of IoT Security Technologies, by Region, 2021
  • Figure 29 : Global Market Shares of IoT Security Technologies, by Organization Size, 2021
  • Figure 30 : Global Market Shares of IoT Security Technologies in Large Enterprises, by Region, 2021
  • Figure 31 : Global Market Shares of IoT Security Technologies in Small and Medium Size Enterprises, by Region, 2021
  • Figure 32 : Global Market Shares of IoT Security Technologies, by Type, 2021
  • Figure 33 : Endpoint Security Process
  • Figure 34 : Global Market Shares of IoT Endpoint Security, by Region, 2021
  • Figure 35 : Global Market Shares of IoT Network Security, by Region, 2021
  • Figure 36 : Application Security Structure
  • Figure 37 : Global Market Shares of IoT Application Securities, by Region, 2021
  • Figure 38 : Global Market Shares of IoT Cloud Security, by Region, 2021
  • Figure 39 : Global Market Shares of IoT in Other Types of Security, by Region, 2021
  • Figure 40 : Global Market Shares of IoT Security Technologies, by End-User Industry, 2021
  • Figure 41 : Global Market Shares of IoT Security Technology in the Manufacturing Industry, by Region, 2021
  • Figure 42 : Potential Attack Areas in Connected Car
  • Figure 43 : Global Market Shares of IoT Security Technology in the Automotive and Transportation Industry, by Region, 2021
  • Figure 44 : Global Market Shares of IoT Security Technology in the Energy and Utilities Industry, by Region, 2021
  • Figure 45 : IoT Architecture in Medical Asset Monitoring
  • Figure 46 : Global Market Shares of IoT Security Technology in the Healthcare Industry, by Region, 2021
  • Figure 47 : Global Market Shares of IoT Security Technology in the Government Sector, by Region, 2021
  • Figure 48 : Global Market Shares of IoT Security Technology in the Retail Industry, by Region, 2021
  • Figure 49 : Global Market Shares of IoT Security Technology in the BFSI Industry, by Region, 2021
  • Figure 50 : Global Market Shares of IoT Security Technology in the Building Infrastructure Industry, by Region, 2021
  • Figure 51 : Global Market Shares of IoT Security Technology in Other End-User Industries, by Region, 2021
  • Figure 52 : Global Market Shares of IoT Security Technologies, by Region, 2021
  • Figure 53 : North American Market Shares of IoT Security Technologies, by Country, 2021
  • Figure 54 : North American Market Shares of IoT Security Technologies, by Major Segment, 2021
  • Figure 55 : North American Market Shares of IoT Security Technologies, by Solution, 2021
  • Figure 56 : North American Market Shares of IoT Security Technologies, by Deployment, 2021
  • Figure 57 : North American Market Shares of IoT Security Technologies, by Organization Size, 2021
  • Figure 58 : North American Market Shares of IoT Security Technologies, by Type of Security, 2021
  • Figure 59 : North American Market Shares of IoT Security Technologies, by End-User Industry, 2021
  • Figure 60 : U.S. Market for IoT Security Technologies, 2021-2027
  • Figure 61 : Canadian Market for IoT Security Technologies, 2021-2027
  • Figure 62 : European Market Shares of IoT Security Technologies, by Country, 2021
  • Figure 63 : European Market Shares of IoT Security Technologies, by Major Segment, 2021
  • Figure 64 : European Market Shares of IoT Security Technologies, by Solution, 2021
  • Figure 65 : European Market Shares of IoT Security Technologies, by Deployment, 2021
  • Figure 66 : European Market Shares of IoT Security Technologies, by Organization Size, 2021
  • Figure 67 : European Market Shares of IoT Security Technologies, by Type of Security, 2021
  • Figure 68 : European Market Shares of IoT Security Technologies, by End-User Industry, 2021
  • Figure 69 : U.K. Market for IoT Security Technologies, 2021-2027
  • Figure 70 : Germany Market for IoT Security Technologies, 2021-2027
  • Figure 71 : French Market for IoT Security Technologies, 2021-2027
  • Figure 72 : Italian Market for IoT Security Technologies, 2021-2027
  • Figure 73 : Rest of the European Market for IoT Security Technologies, 2021-2027
  • Figure 74 : APAC Market Shares of IoT Security Technologies, by Country, 2021
  • Figure 75 : APAC Market Shares of IoT Security, by Major Segment, 2021
  • Figure 76 : APAC Market Shares of IoT Security Technologies, by Solution, 2021
  • Figure 77 : APAC Market Shares of IoT Security Technologies, by Deployment, 2021
  • Figure 78 : APAC Market Shares of IoT Security Technologies, by Organization Size, 2021
  • Figure 79 : APAC Market Shares of IoT Security Technologies, by Type of Security, 2021
  • Figure 80 : APAC Market Shares of IoT Security Technologies, by End-User Industry, 2021
  • Figure 81 : Chinese Market for IoT Security Technologies, 2021-2027
  • Figure 82 : Japanese Market for IoT Security Technologies, 2021-2027
  • Figure 83 : Indian Market for IoT Security Technologies, 2021-2027
  • Figure 84 : South Korean Market for IoT Security Technologies, 2021-2027
  • Figure 85 : Rest of APAC Market for IoT Security Technologies, 2021-2027
  • Figure 86 : Rest of the World Market Shares of IoT Security Technologies, by Subregion, 2021
  • Figure 87 : South American Market for IoT Security Technologies, 2021-2027
  • Figure 88 : Middle East and African Market for IoT Security Technologies, 2021-2027
  • Figure 89 : Rest of the World Market Shares of IoT Security, by Major Segment, 2021
  • Figure 90 : Rest of the World Market Shares of IoT Security Technologies, by Solution, 2021
  • Figure 91 : Rest of the World Market Shares of IoT Security Technologies, by Deployment, 2021
  • Figure 92 : Rest of the World Market Shares of IoT Security Technologies, by Organization Size, 2021
  • Figure 93 : Rest of the World Market Shares of IoT Security Technologies, by Type of Security, 2021
  • Figure 94 : Rest of the World Market Shares of IoT Security Technologies, by End-User Industry, 2021
  • Figure 95 : Amazon.com Inc.: Revenue Share, by Segment, 2021
  • Figure 96 : Amazon.com Inc.: Revenue Share, by Region, 2021
  • Figure 97 : Atos SE: Revenue Share, by Industry, 2021
  • Figure 98 : Atos SE: Revenue Share, by Region, 2021
  • Figure 99 : Cisco Systems Inc.: Revenue Share, by Segment, FY 2022
  • Figure 100 : Cisco Systems Inc.: Revenue Share, by Region, FY 2022
  • Figure 101 : Ericsson: Revenue Share, by Segment, FY 2021
  • Figure 102 : Ericsson: Revenue Share, by Region, FY 2021
  • Figure 103 : ForgeRock Inc.: Revenue Share, by Business Segment, 2022
  • Figure 104 : ForgeRock Inc.: Revenue Share, by Region, 2022
  • Figure 105 : Fortinet Inc.: Revenue Share, by Segment, FY 2021
  • Figure 106 : Fortinet Inc.: Revenue Share, by Region, FY 2021
  • Figure 107 : Infineon Technologies AG: Revenue Share, by Segment, FY 2021
  • Figure 108 : Infineon Technologies AG: Revenue Share, by Region, FY 2021
  • Figure 109 : Intel Corp.: Revenue Share, by Segment, 2021
  • Figure 110 : Intel Corp.: Revenue Share, by Region, 2021
  • Figure 111 : Microsoft Corp.: Revenue Share, by Segment, FY 2022
  • Figure 112 : Microsoft Corp.: Revenue Share, by Region, FY 2022
  • Figure 113 : Palo Alto Networks Inc.: Revenue Share, by Product Segment, 2021
  • Figure 114 : Palo Alto Networks Inc.: Revenue Share, by Region, 2021
  • Figure 115 : Thales Group: Revenue Share, by Business Segment, FY 2021
  • Figure 116 : Thales Group: Revenue Share, by Region, FY 2021
  • Figure 117 : Verizon Communications Inc.: Revenue Share, by Segment, FY 2021