M2MEnterprise IoT

IoT

Strategy Analytics' IoT 2016 Security Threats and Trends Survey Results



Please contact us to discuss pricing Contact Us

Report Summary:

Security has been identified as the #1 Challenge and potential impediment to IoT deployments according to Strategy Analytics’ June 2015 IoT Deployment and Usage Trends Survey. Now, six months later, Strategy Analytics delved more deeply into the specific security threats and issues impacting organizations. Conducted by Strategy Analytics, this independent global survey with over 600 respondents consisted of multiple choice and essay questions – polled security, IT administrators, integrators and C-level executives on a wide range of IoT security issues including:

  • An overview of IoT Security Threats and Trends
  • IoT Security Executive Summary, Survey Highlights
  • Average Annual Expenditure on  Security (Hardware, Software/Apps, Devices & Services)
  • Percentage of Time Corporations Spend Keeping Corporate & IoT Network secure. Hint: Not nearly as much as needed in IoT!
  • IoT Security Challenges: Complexity, Protocol Standardization, Encryption, More Moving Parts
  • IoT Security: Who’s Responsible for Managing Security & Risk?
  • Percentage of Businesses that experienced an attempted or successful IoT hack in the last year
  • Type of IoT hacks & Security Issues that pose the biggest IoT threats risks to organizations
  • What types of security precautions companies are taking to fortify their IoT networks
  • The types of security measures that organizations consider the most effective in securing IoT environments against insider and external hacks
  • The length/duration and severity of IoT security breaches, impact, damage caused & why it matters!
  • Most Important/Crucial IoT Security Priorities
  • Users Speak Out:  Voicing Their Most Pressing IoT Security Concerns

Strategy Analytics also conducted over two dozen first person interviews to validate the survey responses and obtain deeper, contextual insights on what actions businesses are taking to fortify their networks and safeguard their data assets in IoT environments where devices, applications and people are increasingly interconnected and the attack surface has risen exponentially.


Table of Contents

•Overview: IoT Security Threats and Trends
•IoT Security Threats SA Key Conclusions & Take Aways
•Who’s Responsible for Security in IoT Ecosystem?
•Types & Examples of IoT hacks & Security Issues
•IoT Security Time vs Money Spent
•Hourly Cost of Downtime Rises
•Conclusions & Recommendations

For more information about our services please contact us or email support@strategyanalytics.com
Buyer Research

Enterprise Mobility Deployment and Adoption Trends: Education and Public Sector

Find out more

Report

  • This report is available for individual purchase.
  • US and global visitors can buy this report for $1399.
  • UK visitors will be charged £1000.
    Add a one hour briefing with an expert Analyst $1000 ( £820 for UK visitors). This briefing will be scheduled at a mutually convenient time and provide both further depth and clarity on the report topic. A Q&A session will be included.

Service Subscription

  • Access this report as part of a service subscription
  • Benefits of a service subscription:
    • Access to industry leading analysts
    • Both current and historical repository of research
    • Timely updates to forecasts, market share, market sizing, and trendsEtc.

Let's talk

Now you know a little about us, get in touch and tell us what your business problem is.
Name:
Email:
Telephone:
Country:
Inquiry / Message:

please enter captcha from left