Safeguarding a 70 Billion Connected IoT Device Landscape by 2026 Requires an Advanced Three-Pronged Device-to-Cloud Security Approach

---
Safeguarding a 70 Billion Connected IoT Device Landscape by 2026 Requires an Advanced Three-Pronged Device-to-Cloud Security Approach

NEW YORK, Jan. 18, 2024 /PRNewswire/ -- The number of Internet of Things (IoT) end-user devices and IoT edge nodes such as home appliances, personal wearables, industrial robots, and even connected drones is quickly increasing. Global technology intelligence firm ABI Research forecasts that by 2026, the installed base of connected devices will reach more than 70 billion installations, creating an expansive IoT attack vector in the IoT environment. Most of these devices are low-power, storage limited, and with weak computational power, which means these devices are increasingly connecting to the cloud environment for centralized storage, data analytics, real-time monitoring, remote access, and updates in firmware and software. Connecting to the cloud environment creates yet another compromise vector for these devices.  An effective IoT device-to-cloud security strategy should target security in three vital areas: device, network, and cloud.

"Device security often means securing the chipset and the data stored inside the device from being breached. Network security securely transfers data between the IoT device and the cloud. Cloud security allows the data to avoid intrusion while sitting in the cloud," says Michael Amiri, Senior Industrial and IoT Cybersecurity Analyst at ABI Research. Vendors such as  Palo Alto Networks offer visibility into the cloud environment. Its Prisma Cloud solution provides cloud threat visibility, while its Networks Enterprise IoT security focuses on zero-trust frameworks to address IoT device vulnerabilities.  Ayla Networks is an IoT platform provider offering end-to-end software and cloud-based services. Its IoT platform is another cybersecurity offering that addresses device and cloud security by maintaining the integrity of cloud connectivity, providing data analytics, and allowing device manufacturers to connect their IoT portfolios more securely to cloud networks.

In addition to embedded security in device design and cloud provider security offerings, end-users need to ensure the implementation of robust authentication practices, especially given the nature of remote access and remote work regarding the IoT environment. In such an environment, Amiri explains, "Security vendors need to include cloud security solutions at the forefront of their marketing strategies. Emphasizing cloud solutions is fundamental in a market where IoT devices increasingly rely on the cloud for storage, data handling, computation, remote management, and updates." Digicert provides IoT threat detection, offering secure keys through on-premises or cloud-based Hardware Security Modules (HSMs) and generates comprehensive Software Bill of Materials (SBOM) to access visibility into software deployed in the IoT environment. Infineon's CIRREN Cloud ID chip-to-cloud-security solution extends trust from IoT device chips to the cloud, offering public key certificates via the CIRRENT console.

IoT security technology is already experiencing a surge in demand, which will probably accelerate if new regulations for IoT and cloud connections are passed. A case in point is a recent Software Bill of Materials (SBOMs) mandate for medical device manufacturers in the U.S. ABI Research spoke to SBOM service providers, and they unanimously believe regulation has been a significant driver for their services.

"An explosive increase in IoT connections and devices is evident in the next three to four years. North America and the Asia region show the highest level of growth, followed by Western Europe. These will be the largest markets for IoT and cloud security solutions. Traditional markets for IoT security solutions have been the consumer, financial, enterprise, and government verticals. Yet automobile, healthcare, and manufacturing have seen a strong push for IoT security," Amiri concludes.  

These findings are from ABI Research's  Device to Cloud: Security for IoT Device Management application analysis report. This report is part of the company's Industrial Cybersecurity research service, which includes research, data, and analyst insights. Based on extensive primary interviews, Application Analysis reports present an in-depth analysis of key market trends and factors for a specific technology.

About ABI Research

ABI Research is a global technology intelligence firm uniquely positioned at the intersection of technology solution providers and end-market companies. We serve as the bridge that seamlessly connects these two segments by providing exclusive research and expert guidance to drive successful technology implementations and deliver strategies proven to attract and retain customers.

ABI Research是一家全球性的技术情报公司,拥有得天独厚的优势,充当终端市场公司和技术解决方案提供商之间的桥梁,通过提供独家研究和专业性指导,推动成功的技术实施和提供经证明可吸引和留住客户的战略,无缝连接这两大主体。

For more information about ABI Research's services, contact us at +1.516.624.2500 in the Americas, +44.203.326.0140 in Europe, +65.6592.0290 in Asia-Pacific, or visit www.abiresearch.com.

Contact Info

Global
Deborah Petrara
Tel: +1.516.624.2558
pr@abiresearch.com  


Source: ABI Research

Related News

menu
menu