Skip to main content

IoT Data Security Solutions Demand Gains Momentum

Internet of Things (IoT) technology deployments have increased across the globe, as more CIOs and CTOs explore new commercial applications. However, many organizations continue to seek IoT solutions that include comprehensive data protection capabilities.

Security continues to be a major concern for IT professionals when deploying IoT projects within their organizations, according to the latest worldwide market study by 451 Research.

When asked to rank which technologies or processes their organizations considered for current or planned IoT initiatives, 55 percent of respondents ranked IoT security as their top priority.

IoT Security Market Development

As 451 Research data consistently shows, security is a headwind that must be overcome. Survey respondents have consistently rated IoT security as their highest priority – but why?

"The nature of IoT deployments make them particularly difficult to secure against cyber threats," said Brian Partridge, vice president at 451 Research. “As industrial equipment is increasingly connected to the Internet for data collection and analysis, enterprises open themselves to the sophisticated world of security intrusions."

IoT projects often straddle OT and IT domains, which have struggled independently to secure against internal and external threats. When these domains come together driven by IoT, the overall attack surface can increase exponentially.


According to 451 Research analysts, some business leaders have stayed on the sidelines of IoT because they believe the risks are still too high against potential returns, but for those that do initiate IoT projects, security is still a top priority.

Beyond extolling IoT security as the top requirement in their IoT deployments, enterprises value security capabilities as the top reason for choosing a commercial IoT platform, with 58 percent of survey respondents ranking it as the top attribute in choosing a vendor partner.

Furthermore, in an IoT Workloads survey in 2017, enterprises ranked the IoT attack vectors that most concerned them. At the top of this list were poor authentication of IoT endpoints such as sensors and network modules (64.3 percent), unsecured enterprise IoT applications (63 percent) and vulnerabilities in how end users access their IoT devices and applications.

Outlook for IoT Security Products and Services

So where’s the opportunity for IoT providers? According to Brian Partridge, "The silver lining in all of this is that IoT security breaches have raised overall awareness of the issues and consequences when ‘things’ go wrong."

It’s also raised the bar for suppliers who are increasingly fighting for deals based on their security credibility. There's still a need for trusted vendors and services providers that can bring IoT security together holistically for their customers.

Popular posts from this blog

Mobility-as-a-Service Creates Disruptive Travel Options

Building on significant advances in big data, analytics, and the Internet of Things (IoT), more innovative transit service offerings aim to increase public transport ridership and reduce emissions or congestion within metropolitan areas. By providing these services through smartphone apps, the transit services also significantly increase user convenience, providing information on different human mobility offerings -- including public transport, ridesharing, and autonomous vehicles. Mobility-as-a-Service Market Development According to the latest market study by Juniper Research, Mobility-as-a-Service (MaaS) subscribers will generate $53 billion in revenue for MaaS platform providers by 2027 -- that's rising from $5.3 billion in 2021. Let's start with a basic definition. MaaS is the provision of multi-modal end-to-end travel services through single platforms, by which users can determine an optimal route and price. The study identified a monthly subscription model as key to incr

Robocall Mitigation Solutions to Halt Criminal Threats

If you answer the phone and hear a recorded message instead of a live person, it's likely a robocall. A robocall is a phone call that uses a computerized autodialer to deliver a pre-recorded message. In 2020, the U.S. Federal Trade Commission (FTC) received 2.8 million consumer complaints about robocalls. Offering solutions to robocalling and associated fraudulent business practices, computerized mitigation platforms are an integral part of the solution. Platforms that are focused on actionable systems to disrupt unsolicited and potentially criminal phone calls help telecom service providers and industry regulators. Issues of whether one-size-fits-all developments are sufficient to be effective across the spectrum need to be addressed, and whether a single telecom network operator working unilaterally with a third-party platform could compromise desired or mandatory industry-wide standards. Robocall Mitigation Market Development According to the latest worldwide market study by Jun

Why a Distributed Workforce will Raise Productivity

While most senior executives at progressive organizations have already evolved their human resource policies to accommodate employee desire for flexible working models, others still resist change. Unfortunately, many of the laggards are now experiencing the "Great Resignation" phenomenon. The global pandemic required business leaders to rethink when, where, and how their knowledge workers and front-line employees perform their work. Yet even with the ongoing pandemic recovery slowly underway, some organizations are still trying to determine their workforce approach. According to the latest worldwide market study and recent survey data from International Data Corporation (IDC), stability and geography will likely define the balance of future work strategies. Distributed Workforce Market Development On a global basis, physical office sites are expected to be the dominant location for work as legacy organizations eventually find themselves in a more stable environment. However,