PART 01: Executive summary
• Highlights
PART 02: Scope of the report
• Market overview
PART 03: Market research methodology
• Research methodology
• Economic indicators
PART 04: Introduction
• Key market highlights
PART 05: Market description
• Evolution of IoT from machine-to-machine (M2M)
• Components of IoT
• Features of IoT
• Sensors: Integral part of IoT
• Mobile biometrics: Necessity for IoT security
• Growing opportunities with IoT in different industries
• Value chain analysis
PART 06: Market landscape
• Market overview
• Country-wise adoption of IoT
• Market size and forecast
PART 07: Life cycle analysis
PART 08: Market segmentation by end-user
• Segmentation of global IoT security market by end-user
• Global IoT security market by utilities sector
• Global IoT security market by automotive sector
• Global IoT security market by healthcare sector
PART 09: Market segmentation by network security components
• Segmentation of global IoT security market by network security components
• Global IoT security market by hardware
• Global IoT security market by software
• Global IoT security market by services
PART 10: Geographical segmentation
• Global IoT security market by geographical segmentation
• Global IoT security market by geographical segmentation 2015-2020 (revenue)
PART 11: Buying criteria
PART 12: Market drivers
• Need to comply with stringent regulations
• Adoption of cloud-based services
• Growing use of IoT in enterprises
• Increase in number of connected devices
• Increasing security threats
PART 13: Impact of drivers
PART 14: Market challenges
• High TCO of IoT security solutions
• Integration issues among network security components
• Intense vendor competition
• Complex IT infrastructure
PART 15: Impact of drivers and challenges
PART 16: Market trends
• Emergence of integrated security solutions
• Growing use of biometrics for IoT security
• Shift toward multifactor authentication
• Growing use of SSO
• Emergence of smart cities
• Growing need for IoT security in healthcare sector
PART 17: Five forces model
PART 18: Role of system integrators
PART 19: Vendor landscape
• Competitive scenario
• Product offerings
• Vendor description
• Vendor matrix
• Competitive rating
• M&A
• Partnerships
• Other prominent vendors
PART 20: Appendix
• List of abbreviations
PART 21: Explore Technavio
[List of Exhibits]Exhibit 01: IoT security features and their implementation
Exhibit 02: Evolution of IoT from M2M
Exhibit 03: Growing opportunities with IoT
Exhibit 04: Value chain analysis
Exhibit 05: Global IoT security market
Exhibit 06: Global IoT security market 2015-2020 ($ billions)
Exhibit 07: Life cycle analysis
Exhibit 08: Segmentation of global IoT security market by end-users 2015-2020
Exhibit 09: Global IoT security market by utilities sector 2015-2020 ($ billions)
Exhibit 10: Global IoT security market by automotive sector 2015-2020 ($ billions)
Exhibit 11: Global IoT security market by healthcare sector 2015-2020 ($ billions)
Exhibit 12: Segmentation of global IoT security market by network security components
Exhibit 13: Global IoT security market by hardware 2015-2020 ($ billions)
Exhibit 14: Global IoT security market by software 2015-2020 ($ billions)
Exhibit 15: Global IoT security market by services 2015-2020 ($ billions)
Exhibit 16: Global IoT security market by geographical segmentation 2015-2020
Exhibit 17: Global IoT security market by geographical segmentation 2015-2020 ($ billions)
Exhibit 18: Buying criteria
Exhibit 19: Regulations for e-mail encryption
Exhibit 20: Number of connected devices in use across the globe (billions)
Exhibit 21: Impact of drivers
Exhibit 22: Impact of drivers and challenges
Exhibit 23: Five forces model
Exhibit 24: Product offerings
Exhibit 25: Vendor matrix
Exhibit 26: Competitive rating
Exhibit 27: M&A
Exhibit 28: Partnerships
Exhibit 29: Other prominent vendors
【掲載企業】
Cisco Systems, Infineon Technologies, Intel, GE (Wurldtech Security Technologies), Symantec, Axeda Machine Cloud, Broadcom, Digi International, Ericsson, Eurotech, Fortinet, Gemalto, IBM, Kore Wireless, NetComm Wireless, Nokia, Numerex, Palo Alto Networks, Rockwell Automation, Secure Crossing, Sierra Wireless, Sophos, Systech Solutions, Telit, Tofino, Ventus Wireless.
【レポートのキーワード】
モノのインターネット、ネットワーク、セキュリティ製品、IoTセキュリティ、ハードウェア、ソフトウェア、サービス
【リサーチ方法】
一次資料による調査(業界専門家、ベンダー、代理店、顧客等を対象にしたデプスインタビュー調査など)及び二次資料による調査(Technavio独自のプラットフォーム、産業書籍、企業報告書、ニュース記事、アナリストレポート、貿易協会、政府機関発行データなど)
【免責事項】
http://www.globalresearch.jp/disclaimer