SA IoT 2016 Security Threats and Trends Report: Perilous, Porous and Pernicious

Please contact us to discuss pricing Contact Us

US and global visitors can buy this report for $1399
UK visitors will be charged £1100

This report is available for individual purchase.

Report Summary:

The Internet of Things offers greater opportunities but in interconnected environments, the security risks increase exponentially and the attack vector or surface is in theory, potentially limitless. Strategy Analytics 2015 IoT Deployment and Usage Trends Survey which polled over 400 businesses in June 2015 identified security as the number one challenge that presented the biggest impediment to IoT deployments according to 40% of survey respondents.  Six months later, security threats loom larger than ever as corporate enterprises ramp up their mainstream Internet of Things deployments.

Strategy Analytics 2016 IoT Security Threats and Trends Survey polled C-level executives, IT managers, software developers, consultants and systems integrators at 600 global organizations representing 30 different vertical markets in November and December 2015.

The results of SA’s latest research, the Strategy Analytics 2016 IoT Security Threats and Trends Survey indicate that corporations are confronting an IoT security threat landscape for which they may be woefully ill-prepared.  

Table of Contents

1.       Executive Summary  4

2.       Introduction  6

2.1     IoT Increases Attack Surfaces Exponentially  6

3.       SA Security Survey: Analyzing the Threats and Trends  9

3.1     IoT Security Trends by Vertical Market 9

3.2     IT Departments Bear the Brunt of the IoT Security Burden  10

3.3     End Users: The Weakest Link in the IoT Security Chain  11

3.4     The Reality: Successful Security Hacks Increase  12

4.       The IoT Threat Landscape: Vendor Perspective  13

4.1     IoT Automotive Security: Driving Blind?  15

4.2     IoT Security and Data Privacy in Healthcare  17

5.       Demand for IoT Data Privacy Spawns Tougher Regulatory Compliance & Governance  19

5.1     IoT Data Privacy Solutions  21

6.       The Cost and Consequences of Data Security Breaches  22

7.       Conclusions 24

8.       Recommendations  25

9.       Contact the Author of This Report 26

For more information about our services please contact us or email support@strategyanalytics.com

Let's talk

Now you know a little about us, get in touch and tell us what your business problem is.
Inquiry / Message: