M2M物联网

Ask the author
Author: Gina Luk
Co Author: Andrew Brown
Publication Date: 1月 19 2016
Pages: 27
Report Type: Report, Word

相关的数据可视化界面

物联网

SA IoT 2016 Security Threats and Trends Report: Perilous, Porous and Pernicious



Please contact us to discuss pricing Contact Us

Report Summary:

The Internet of Things offers greater opportunities but in interconnected environments, the security risks increase exponentially and the attack vector or surface is in theory, potentially limitless. Strategy Analytics 2015 IoT Deployment and Usage Trends Survey which polled over 400 businesses in June 2015 identified security as the number one challenge that presented the biggest impediment to IoT deployments according to 40% of survey respondents.  Six months later, security threats loom larger than ever as corporate enterprises ramp up their mainstream Internet of Things deployments.

Strategy Analytics 2016 IoT Security Threats and Trends Survey polled C-level executives, IT managers, software developers, consultants and systems integrators at 600 global organizations representing 30 different vertical markets in November and December 2015.

The results of SA’s latest research, the Strategy Analytics 2016 IoT Security Threats and Trends Survey indicate that corporations are confronting an IoT security threat landscape for which they may be woefully ill-prepared.  


Table of Contents

1.       Executive Summary  4

2.       Introduction  6

2.1     IoT Increases Attack Surfaces Exponentially  6

3.       SA Security Survey: Analyzing the Threats and Trends  9

3.1     IoT Security Trends by Vertical Market 9

3.2     IT Departments Bear the Brunt of the IoT Security Burden  10

3.3     End Users: The Weakest Link in the IoT Security Chain  11

3.4     The Reality: Successful Security Hacks Increase  12

4.       The IoT Threat Landscape: Vendor Perspective  13

4.1     IoT Automotive Security: Driving Blind?  15

4.2     IoT Security and Data Privacy in Healthcare  17

5.       Demand for IoT Data Privacy Spawns Tougher Regulatory Compliance & Governance  19

5.1     IoT Data Privacy Solutions  21

6.       The Cost and Consequences of Data Security Breaches  22

7.       Conclusions 24

8.       Recommendations  25

9.       Contact the Author of This Report 26

For more information about our services please contact us or email support@strategyanalytics.com

Report

  • This report is available for individual purchase.
  • US and global visitors can buy this report for $1399.
  • UK visitors will be charged £1000.
    Add a one hour briefing with an expert Analyst $1000 ( £820 for UK visitors). This briefing will be scheduled at a mutually convenient time and provide both further depth and clarity on the report topic. A Q&A session will be included.

Service Subscription

  • Access this report as part of a service subscription
  • Benefits of a service subscription:
    • Access to industry leading analysts
    • Both current and historical repository of research
    • Timely updates to forecasts, market share, market sizing, and trendsEtc.

Let's talk

Now you know a little about us, get in touch and tell us what your business problem is.
Name:
Email:
Telephone:
Country:
Inquiry / Message:

please enter captcha from left