sb-nz logo
Story image

Research: Rapid growth of embedded security market inevitable

29 Jun 2020

ABI Research, a tech market advisory firm, forecasts shipments for secure hardware serving digital authentication and embedded security will reach 5.3 billion by 2024, double the number of shipments in 2019.

In the ongoing push for more secure IoT devices and applications, the hardware choices for embedded security are growing dynamically, a statement from the company says.

“Hardware-based security offers better protection from manipulation and interference than its software-based counterpart because it’s more difficult to alter or attack the physical device or data entry points. Yet, less than 10% of IoT devices are currently being protected with hardware security,” explains ABI Research digital security research director Michela Menting. 

Hardware security technology development is accelerating rapidly and the technologies being adopted today in IoT markets come in a range of form factors. 

Some are adapted from existing security solutions, such as trusted platform modules (TPMs) and trusted execution environments (TEEs), NFC embedded secure elements and authentication ICs, while others are emerging from IoT market demand, such as embedded SIM (eSIM) and secure microcontrollers.

This range provides OEMs a choice in security feature sets that can be adapted to their specific use cases. 

Higher-level security demands will likely incorporate TPMs or TEEs (e.g. for automotive) to manage encryption keys or run secure operating systems. 

Conversely, for devices that only need basic security functionalities, an eSIM or authentication IC (e.g. consumer devices) for a simple identifier or for brand protection purposes should suffice.

This dynamism means there is plenty of opportunity in the market for new secure hardware technologies targeted at the IoT. 

The emergence of iSIM, secure microcontrollers with TEE functionality, and even hybrid dual-core micro and application processors are a testament to the growing demand for embedded security, comments Menting.

To corner the market on these new technologies, vendors are competing aggressively to offer a slew of complimentary development and connectivity services, allowing faster R&D processes and cutting go-to-market timeframes. 

The focus of these services is to provide seamless and interoperable links with third parties further down the value chain, such as IoT enablement platform and cloud providers.

The efforts in R&D in technology advancement for hardware security for the IoT has been driven in large part by companies such as NXP, Infineon, STMicroelectronics, Renesas, Arm, Qualcomm, Samsung, Intel, Microchip, Maxim, Nuvoton, MediaTek, Texas Instruments, Gemalto, G+D, IDEMIA, Rambus, Synopsis, Silex IP, MIPS, Intrinsic ID, and Kudelski IoT Security, among others.

“Embedded security technologies provide an effective anchor from which trust can be established, and from where new supporting platforms and services, such as device lifecycle management, can be supported. As such, they are seeing a high adoption rate in IoT applications,” Menting adds.

These findings are from ABI Research’s Digital Authentication and Embedded Security market data report and Embedded Security for the IoT technology analysis report. 

Story image
Fortinet’s ‘zero trust’ approach redefining security
Cornelius Mare, Fortinet A/NZ Director, Security Solutions, explains why taking a ‘zero trust network access’ approach to cybersecurity requires fully-integrated and comprehensive security services and policies.More
Story image
InternetNZ tackles increased cyberattacks with new partnership
"We want to arm our customers with the best possible defence against known threats on the Internet."More
Story image
Video: 10 Minute IT Jams - The benefits of converged cloud security
Today, Techday speaks to Forcepoint senior sales engineer and solutions architect Matthew Bant, who discusses the benefits of a converged cloud security model, and the pandemic's role in complicating the security stack in organisations around the world.More
Story image
Malware and email scams targeting employees spread rapidly in Q2
"Businesses must stay alert and should employ defense-in-depth tactics and equip themselves with multilayered security mechanisms, including high-sensor spam filters and a VPN connection, which would prevent malicious pages from opening."More
Story image
Yubico launches latest YubiKey with NFC & USB-C support
Yubico has released a new hardware authentication key, designed to provide security through both near-field communication (NFC) and USB-C connections and smart card support.More
Link image
Webinar: Best practices for keeping your video chats secure
Video collaboration providers nowadays operate exclusively on a multi-tenant, public cloud - and security and privacy concerns have come into the spotlight. Here's how to secure your communications.More