Device Authentication Services for IoT Cybersecurity to Reach $8.4 Billion in Revenues by 2026

ABI Research | July 06, 2020

By 2026, IoT connections will exceed 23 billion across all major IoT markets. Almost all those connections will be faced with incessant and constantly evolving cyber-threats, forcing implementers and IoT vendors to embrace new digital security options to protect managed fleets and connected assets. Secure device authentication currently stands among the top-tier investment priorities for key IoT markets. Global tech market advisory firm, ABI Research, expects that hardware focused IoT authentication services will reach US$8.4 billion in revenues by 2026. "There are several key technologies revolving around authentication security that currently transform the IoT device value chain. Chief elements among them revolve around IoT identity issuance, provisioning, authentication, encryption key lifecycle management, access management and attestation," explains Dimitrios Pavlakis, Industry Analyst at ABI Research. These are the prime focus of IoT vendors who capitalize on the emerging threat horizon to better position their services and explore new IoT monetization models. "As it currently stands, the IoT is not a secure place for future deployments and both IoT players and digital security vendors are aware of that," comments Pavlakis. "The good news is that the recent change in thinking has caused a noticeable mentality shift and investment surge for secure authentication technologies across the IoT ecosystem; the bad news is that this also gives rise to many IoT management offerings with questionable levels of security and intelligence." IoT authentication services need to consider a plethora of variables, sharing both operational and connectivity as well as security characteristics. "Just because cybersecurity investments need to enter deeper into the IoT deployment equation does not mean that operational variables will be left unaccounted," explains Pavlakis. "Bandwidth capacity, connectivity requirements, operational specifications and device heterogeneity, digital footprint and processing power, edge-cloud dependencies, telemetry and intelligence are all key factors that need to be addressed to obtain a sustainable growth for the IoT going forward." Many IoT security vendors are taking advantage of the recent IoT investment surge to increase their market footprint and deliver security-first authentication and management services for the IoT supported by a multitude of flexible pricing models. Market leaders and innovative companies offering IoT security services operating in different areas of the IoT value chain include Intel, Microsoft Azure, Amazon Web Services, Entrust Datacard, Rambus, Data I/O, and Globalsign.

Spotlight

Defenses at Risk Many organizations are not proactively adapting their cyber defenses to stay ahead of attackers and protect their sensitive information and systems. Almost half (46%) say their security strategy rarely changes substantially— even after a cyber-attack. Security Strategy Not Keeping Up with Known Risks. Many organizations do not adequately manage or secure their privileged accounts, credentials and secrets.

Spotlight

Defenses at Risk Many organizations are not proactively adapting their cyber defenses to stay ahead of attackers and protect their sensitive information and systems. Almost half (46%) say their security strategy rarely changes substantially— even after a cyber-attack. Security Strategy Not Keeping Up with Known Risks. Many organizations do not adequately manage or secure their privileged accounts, credentials and secrets.

Related News

DATA SECURITY

Cigent Technology Introduces New Cybersecurity Solutions to Prevent Ransomware Attacks and Prevent Data Theft Even After a Security Breach

Cigent Technology | April 28, 2021

Cigent® Technology, an In-Q-Tel®-backed startup, today launched Cigent Data Defense, a game-changing solution that defends businesses and individuals against malware, data theft, and malicious insider attacks, putting an end to the cybersecurity industry's 30-year failure. Cigent Data Defense technology makes use of Cigent's Windows®-based D3E® (Dynamic Data Defense EngineTM) software solution and Cigent's self-defending Safe Solid-State Drives (SSDs). Cigent Data Defense technology, which was originally designed for government/military use, is now available for private use by individuals, small-to-medium-sized businesses, large corporations, and government agencies. Cigent Data Defense, which integrates D3E technologies with Cigent Secure SSDsTM, takes a different approach to data theft and ransomware protection than previous cybersecurity technology. Cigent's D3E for Windows is the first and only data protection software that uses file-level Zero-Trust access controls to defend sensitive files from any attack. D3E uses multi-factor authentication and encryption to protect confidential data anywhere they are shared or stored, even after a security breach. D3E can function as a stand-alone software solution or in combination with Cigent Secure SSDs. The second half of the Cigent Data Defence solution consists of self-defending internal and external Secure SSDs from Cigent. Cigent Secure SSDs are the world's first and only storage devices that put cybersecurity safeguards as near to the data as practicable inside the device's firmware. This patented technique prevents data theft by keeping sensitive data unavailable and protected under the OS layer. It also protects against ransomware by incorporating machine learning algorithms into the storage that detect and repel unauthorized attempts to encrypt data. Cigent's Secure SSDs have "safe rooms" that use zero trust multi-factor authentication and hardware-based encryption to protect data at all times, right after the user logs in. When not in operation, they are invisible to an attacker and vanish from the OS layer when a threat is observed. When used together or separately, D3E applications and Cigent Secure SSDs have a layer of protection that is impossible to bypass. About Cigent Cigent is a cybersecurity firm backed by In-Q-Tel that was developed by data recovery, storage, and cyber threat specialists to protect companies and individuals from any threat vector, even after a security breach. Cigent Data Defense solves the cybersecurity industry's more than three decades of inability to combat ransomware, data theft, and insider theft by placing protection as near to the data as possible - within the firmware of storage devices - and adding Zero Trust multi-factor authentication that safeguards data at the edge, on the network, in the cloud, even when exchanged with trusted users. Cigent Data Defense is comprised of Cigent's D³E® (Dynamic Data Defense Engine™) Windows®-based software and Cigent's self-defending Secure Solid-State Drives (SSDs).

Read More

Velocity, A Managed Services Company Names Anthony Nguyen As New CIO/CISO

prnewswire | October 16, 2020

Velocity, A Managed Services Company, announced today that Anthony Nguyen has been named chief information officer/chief information security officer. In this role, Nguyen will lead the global efforts on cybersecurity by obtaining industry certifications such as HITRUST that will enable Velocity's expansion into other markets. Velocity has been working diligently on implementing a robust strategy to approach the need for innovation and competitive advantage by partnering with new technologies, improving infrastructure operations, and increasing security. "Anthony is an extremely talented and accomplished leader. He brings a wealth of experience in leading and maturing infrastructure and network functions that is timely for Velocity's fast-paced growth and expansion," said Greg Kiley, Founder and CEO of Velocity.

Read More

Operational resource aimed at helping small newsrooms shore-up their cybersecurity practices

prnewswire | October 15, 2020

Today the Global Cyber Alliance (GCA) released the GCA Cybersecurity Toolkit for Journalists at the 2020 Online News Association conference. The toolkit is a free, operational resource aimed at helping journalists, watchdogs, and small newsrooms shore-up their cybersecurity practices. Journalists around the world have long been targets of cyber attacks, whether reporting on crime, politics, or simply being a target for the spread of disinformation. Recent examples include an Angolan journalist reporting on the embezzlement of public funds and two Turkish journalists whose accounts and devices were compromised after reporting on the death of Turkish soldiers in Libya. In order to provide some practical resources to manage these risks, GCA assembled a set of tools that journalists can use to shore up their cyber defenses, protect their devices and data, and help safeguard their online presence.

Read More