sb-nz logo
Story image

Device authentication services to reach $8.4 billion by 2026 in response to IoT cybersecurity

Internet of Things connections are expected to exceed 23 billion across all major IoT markets by 2026, according to new figures from ABI Research. 

The analyst firm's Device Authentication in IoT technology analysis report reveals almost all those connections will be faced with incessant and constantly evolving cyber-threats, forcing implementers and IoT vendors to embrace new digital security options to protect managed fleets and connected assets. Secure device authentication currently stands among the top-tier investment priorities for key IoT markets. 

It expects that hardware-focused IoT authentication services will reach US$8.4 billion in revenues by 2026. reach US$8.4 billion in revenues

"There are several key technologies revolving around authentication security that currently transform the IoT device value chain. Chief elements among them revolve around IoT identity issuance, provisioning, authentication, encryption key lifecycle management, access management, and attestation," explains Dimitrios Pavlakis, industry analyst at ABI Research. 

"These are the prime focus of IoT vendors who capitalise on the emerging threat horizon to better position their services and explore new IoT monetisation models," he says.

"As it currently stands, the IoT is not a secure place for future deployments and both IoT players and digital security vendors are aware of that," says Pavlakis. 

"The good news is that the recent change in thinking has caused a noticeable mentality shift and investment surge for secure authentication technologies across the IoT ecosystem; the bad news is that this also gives rise to many IoT management offerings with questionable levels of security and intelligence."

According to Pavlakis, IoT authentication services need to consider a plethora of variables, sharing both operational and connectivity as well as security characteristics. 

"Just because cybersecurity investments need to enter deeper into the IoT deployment equation does not mean that operational variables will be left unaccounted," he says. 

"Bandwidth capacity, connectivity requirements, operational specifications, and device heterogeneity, digital footprint and processing power, edge-cloud dependencies, telemetry and intelligence are all key factors that need to be addressed to obtain a sustainable growth for the IoT going forward."

ABI Research says many IoT security vendors are taking advantage of the recent IoT investment surge to increase their market footprint and deliver security-first authentication and management services for the IoT supported by a multitude of flexible pricing models. 

According to the report, market leaders and innovative companies offering Internet of Things security services operating in different areas of the IoT value chain include Intel, Microsoft Azure, Amazon Web Services, Entrust Datacard, Rambus, Data I/O, as well as Globalsign.

Story image
Insider threat report reveals deception in the workforce
Insider threats come from people inside an enterprise, whether they divulge proprietary information with nefarious intentions, or are just careless employees that unwittingly share sensitive data, writes Bitglass product marketing manager Juan Lugo.More
Story image
New project development inhibited by cybersecurity, Kaspersky research states
"There are still some practical steps that can be taken to make sure that an emerging technology or a product reaches its launch. Cybersecurity doesn’t have to be another corporate barrier, but it should be on an integral part of the project all long."More
Story image
Why zero trust could fail due to lack of understanding​, not technology
Security architects are being forced to re-examine the concept of identity, with many turning to a zero trust security model to provide a better architecture for protecting their sensitive resources.More
Story image
Backups as a last line of defence are under threat
Malware can incrementally overwrite and encrypt backups, rendering them inadequate as an insurance policy against ransomware.More
Story image
Experiencing ransomware significantly impacts cybersecurity approach
"The survey findings illustrate clearly the impact of these near-impossible demands. Among other things, those hit by ransomware were found to have severely undermined confidence in their own cyber threat awareness."More
Story image
How cyber-attackers use Microsoft 365 tools to steal data
Vectra security research has recently identified how cyber-attackers use Microsoft Office 365 tools against organisations to steal data and take over accounts.More