物联网

Strategy Analytics' IoT 2016 Security Threats and Trends Survey Results




Please contact us to discuss pricing Contact Us

Report Summary:

Security has been identified as the #1 Challenge and potential impediment to IoT deployments according to Strategy Analytics’ June 2015 IoT Deployment and Usage Trends Survey. Now, six months later, Strategy Analytics delved more deeply into the specific security threats and issues impacting organizations. Conducted by Strategy Analytics, this independent global survey with over 600 respondents consisted of multiple choice and essay questions – polled security, IT administrators, integrators and C-level executives on a wide range of IoT security issues including:

  • An overview of IoT Security Threats and Trends
  • IoT Security Executive Summary, Survey Highlights
  • Average Annual Expenditure on  Security (Hardware, Software/Apps, Devices & Services)
  • Percentage of Time Corporations Spend Keeping Corporate & IoT Network secure. Hint: Not nearly as much as needed in IoT!
  • IoT Security Challenges: Complexity, Protocol Standardization, Encryption, More Moving Parts
  • IoT Security: Who’s Responsible for Managing Security & Risk?
  • Percentage of Businesses that experienced an attempted or successful IoT hack in the last year
  • Type of IoT hacks & Security Issues that pose the biggest IoT threats risks to organizations
  • What types of security precautions companies are taking to fortify their IoT networks
  • The types of security measures that organizations consider the most effective in securing IoT environments against insider and external hacks
  • The length/duration and severity of IoT security breaches, impact, damage caused & why it matters!
  • Most Important/Crucial IoT Security Priorities
  • Users Speak Out:  Voicing Their Most Pressing IoT Security Concerns

Strategy Analytics also conducted over two dozen first person interviews to validate the survey responses and obtain deeper, contextual insights on what actions businesses are taking to fortify their networks and safeguard their data assets in IoT environments where devices, applications and people are increasingly interconnected and the attack surface has risen exponentially.



Table of Contents

•Overview: IoT Security Threats and Trends
•IoT Security Threats SA Key Conclusions & Take Aways
•Who’s Responsible for Security in IoT Ecosystem?
•Types & Examples of IoT hacks & Security Issues
•IoT Security Time vs Money Spent
•Hourly Cost of Downtime Rises
•Conclusions & Recommendations

For more information about our services please contact us or email support@strategyanalytics.com