SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
M2M and IoT Markets
Godfrey Chua, Principal Analyst
Machina Research
Security of Things Forum
Cambridge, MA
September 2015
M2M connections will grow from 5 billion
in 2014 to 27 billion in 2024
• Machina Research defines
M2M as “Connections to
remote sensing, monitoring
and actuating devices,
together with associated
aggregation devices”
• Based on this definition
there were 5 billion M2M
connections in 2014 and
there will be 27 billion in
2024, a CAGR of 18%
Machina Research 2
Global machine-to-machine connections
2014-24
Source: Machina Research 2015
Note: in this edition our Global M2M report, as in the previous
editions, we have included in-building network infrastructure
within our definition of M2M. As such, devices such as residential
modems/ routers are included.
Short-range technologies will dominate
M2M
• Over two-thirds of
connections in 2024
will be short range (e.g.
in-building PLC, WiFi,
Zigbee, Z-Wave)
• 14% of connections in
2024 will be LPWA,
driven by the simplicity
of deployment
Machina Research 3
Global M2M connections 2014-2024 by
technology
Source: Machina Research 2015
Wide area M2M connections will be
dominated by LPWA technologies
• By 2024, almost half of wide
area M2M connections will be
supported by LPWA
technologies
• LPWA technologies are
attractive due to:
o ease of deployment
o homogeneity of solution
o low price and long battery life
• Cellular connections account
for almost one-third because
as well as the first two
benefits they also deliver high
capacity and mobility
Machina Research 4
Wide area M2M connections by technology,
2014-24
Source: Machina Research 2015
M2M accounted for 4% of cellular
connections in 2014, rising to 18% in 2024
• At the end of 2014 there
were over 250 million
cellular M2M connections
• By 2024 M2M’s share of
cellular connections will
have increased to nearly 1
in 5
• M2M accounts for nearly
half of the growth in cellular
connections from 2014-24
Machina Research 5
Machine-to-machine’s share of cellular
connected devices, 2014-2024
Source: Machina Research 2015
0%
2%
4%
6%
8%
10%
12%
14%
16%
18%
20%
-
3
6
9
12
15
Handset/Tablet PC/Laptop
M2M % M2M
Connected Car will account for 52% of
cellular connections in 2024
• The top application groups
for cellular connections will
be:
o Connected Car
o Connected Living and
Working
• The Connected Car is top
because it needs features
only cellular can provide:
o Comprehensive coverage
o High-speed mobility
o High bandwidth
Machina Research 6
Machine-to-machine cellular connections by
biggest applications, 2024
Source: Machina Research 2015
M2M and IoT solutions are complex and
made up of several components
Devices
Networks
Platforms
Internet of
Things
Connected things,
products, systems,
applications, etc.
Security
Storage
ApplicationsData Processing
Machina Research 7
M2M and IoT SECURITY must encompass
all components
Devices
Networks
Platforms
Internet of
Things
Connected things,
products, systems,
applications, etc.
Security
Storage
ApplicationsData Processing
Machina Research 8
Security is a top of mind concern
Machina Research 9
Source: Xively and Machina Research Survey 2015
Some key elements in security
• Data security and privacy
• Lightweight device controllers
• Firmware security updates
• Pervasiveness
• Passwords (and the human element)
Machina Research 10
Key considerations in security
• Must be built into the business case
o Align security efforts with business value
• Partner collaboration is essential
o Overall solution security is only as strong as the
weakest link
• Contingency planning
o Is 100% security truly possible?
Machina Research 11
Machina Research 12
Thank you!
Godfrey Chua
Email: godfrey.chua@machinaresearch.com
Twitter: gsc_IoT

Contenu connexe

En vedette

Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...
Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...
Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...Business of Software Conference
 
Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016
Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016
Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016Business of Software Conference
 
Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016
Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016
Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016Business of Software Conference
 
Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...
Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...
Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...Business of Software Conference
 
Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016
Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016
Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016Business of Software Conference
 
B2B Webinar: Creating Your Digital Roadmap. Why Now?
B2B Webinar: Creating Your Digital Roadmap. Why Now?B2B Webinar: Creating Your Digital Roadmap. Why Now?
B2B Webinar: Creating Your Digital Roadmap. Why Now?CrossView
 
The Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsThe Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsParviz Iskhakov
 
Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devicesmentoresd
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 

En vedette (13)

Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...
Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...
Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...
 
Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016
Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016
Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016
 
Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016
Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016
Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016
 
Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...
Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...
Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...
 
Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016
Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016
Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016
 
B2B Webinar: Creating Your Digital Roadmap. Why Now?
B2B Webinar: Creating Your Digital Roadmap. Why Now?B2B Webinar: Creating Your Digital Roadmap. Why Now?
B2B Webinar: Creating Your Digital Roadmap. Why Now?
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
The Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsThe Digital Telecom. Internet of Things
The Digital Telecom. Internet of Things
 
Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devices
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 

Plus de The Security of Things Forum

Plus de The Security of Things Forum (6)

Securing the Fog
Securing the FogSecuring the Fog
Securing the Fog
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
What is being exposed from IoT Devices
What is being exposed from IoT DevicesWhat is being exposed from IoT Devices
What is being exposed from IoT Devices
 
Securing Internet of Things with Trustworthy Computing
Securing Internet of Things with Trustworthy ComputingSecuring Internet of Things with Trustworthy Computing
Securing Internet of Things with Trustworthy Computing
 
SOHOpelessly Broken
SOHOpelessly BrokenSOHOpelessly Broken
SOHOpelessly Broken
 
The Harsh Reality of Slow Movers
The Harsh Reality of Slow MoversThe Harsh Reality of Slow Movers
The Harsh Reality of Slow Movers
 

Dernier

🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...
🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...
🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...Apsara Of India
 
08448380779 Call Girls In Shahdara Women Seeking Men
08448380779 Call Girls In Shahdara Women Seeking Men08448380779 Call Girls In Shahdara Women Seeking Men
08448380779 Call Girls In Shahdara Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking MenDelhi Call girls
 
Top 10 Traditional Indian Handicrafts.pptx
Top 10 Traditional Indian Handicrafts.pptxTop 10 Traditional Indian Handicrafts.pptx
Top 10 Traditional Indian Handicrafts.pptxdishha99
 
How to Get Unpublished Flight Deals and Discounts?
How to Get Unpublished Flight Deals and Discounts?How to Get Unpublished Flight Deals and Discounts?
How to Get Unpublished Flight Deals and Discounts?FlyFairTravels
 
08448380779 Call Girls In Chhattarpur Women Seeking Men
08448380779 Call Girls In Chhattarpur Women Seeking Men08448380779 Call Girls In Chhattarpur Women Seeking Men
08448380779 Call Girls In Chhattarpur Women Seeking MenDelhi Call girls
 
DARK TRAVEL AGENCY presented by Khuda Bux
DARK TRAVEL AGENCY presented by Khuda BuxDARK TRAVEL AGENCY presented by Khuda Bux
DARK TRAVEL AGENCY presented by Khuda BuxBeEducate
 
Genesis 1:6 || Meditate the Scripture daily verse by verse
Genesis 1:6  ||  Meditate the Scripture daily verse by verseGenesis 1:6  ||  Meditate the Scripture daily verse by verse
Genesis 1:6 || Meditate the Scripture daily verse by versemaricelcanoynuay
 
08448380779 Call Girls In Chirag Enclave Women Seeking Men
08448380779 Call Girls In Chirag Enclave Women Seeking Men08448380779 Call Girls In Chirag Enclave Women Seeking Men
08448380779 Call Girls In Chirag Enclave Women Seeking MenDelhi Call girls
 
9 Days Kenya Ultimate Safari Odyssey with Kibera Holiday Safaris
9 Days Kenya Ultimate Safari Odyssey with Kibera Holiday Safaris9 Days Kenya Ultimate Safari Odyssey with Kibera Holiday Safaris
9 Days Kenya Ultimate Safari Odyssey with Kibera Holiday SafarisKibera Holiday Safaris Safaris
 
Hire 💕 8617697112 Champawat Call Girls Service Call Girls Agency
Hire 💕 8617697112 Champawat Call Girls Service Call Girls AgencyHire 💕 8617697112 Champawat Call Girls Service Call Girls Agency
Hire 💕 8617697112 Champawat Call Girls Service Call Girls AgencyNitya salvi
 
visa consultant | 📞📞 03094429236 || Best Study Visa Consultant
visa consultant | 📞📞 03094429236 || Best Study Visa Consultantvisa consultant | 📞📞 03094429236 || Best Study Visa Consultant
visa consultant | 📞📞 03094429236 || Best Study Visa ConsultantSherazi Tours
 
char Dham yatra, Uttarakhand tourism.pptx
char Dham yatra, Uttarakhand tourism.pptxchar Dham yatra, Uttarakhand tourism.pptx
char Dham yatra, Uttarakhand tourism.pptxpalakdigital7
 
Night 7k Call Girls Noida Sector 93 Escorts Call Me: 8448380779
Night 7k Call Girls Noida Sector 93 Escorts Call Me: 8448380779Night 7k Call Girls Noida Sector 93 Escorts Call Me: 8448380779
Night 7k Call Girls Noida Sector 93 Escorts Call Me: 8448380779Delhi Call girls
 
BERMUDA Triangle the mystery of life.pptx
BERMUDA Triangle the mystery of life.pptxBERMUDA Triangle the mystery of life.pptx
BERMUDA Triangle the mystery of life.pptxseri bangash
 
Study Consultants in Lahore || 📞03094429236
Study Consultants in Lahore || 📞03094429236Study Consultants in Lahore || 📞03094429236
Study Consultants in Lahore || 📞03094429236Sherazi Tours
 
💕📲09602870969💓Girl Escort Services Udaipur Call Girls in Chittorgarh Haldighati
💕📲09602870969💓Girl Escort Services Udaipur Call Girls in Chittorgarh Haldighati💕📲09602870969💓Girl Escort Services Udaipur Call Girls in Chittorgarh Haldighati
💕📲09602870969💓Girl Escort Services Udaipur Call Girls in Chittorgarh HaldighatiApsara Of India
 

Dernier (20)

🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...
🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...
🔥HOT🔥📲9602870969🔥Prostitute Service in Udaipur Call Girls in City Palace Lake...
 
08448380779 Call Girls In Shahdara Women Seeking Men
08448380779 Call Girls In Shahdara Women Seeking Men08448380779 Call Girls In Shahdara Women Seeking Men
08448380779 Call Girls In Shahdara Women Seeking Men
 
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men
08448380779 Call Girls In Bhikaji Cama Palace Women Seeking Men
 
Top 10 Traditional Indian Handicrafts.pptx
Top 10 Traditional Indian Handicrafts.pptxTop 10 Traditional Indian Handicrafts.pptx
Top 10 Traditional Indian Handicrafts.pptx
 
How to Get Unpublished Flight Deals and Discounts?
How to Get Unpublished Flight Deals and Discounts?How to Get Unpublished Flight Deals and Discounts?
How to Get Unpublished Flight Deals and Discounts?
 
08448380779 Call Girls In Chhattarpur Women Seeking Men
08448380779 Call Girls In Chhattarpur Women Seeking Men08448380779 Call Girls In Chhattarpur Women Seeking Men
08448380779 Call Girls In Chhattarpur Women Seeking Men
 
DARK TRAVEL AGENCY presented by Khuda Bux
DARK TRAVEL AGENCY presented by Khuda BuxDARK TRAVEL AGENCY presented by Khuda Bux
DARK TRAVEL AGENCY presented by Khuda Bux
 
Call Girls In Munirka 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Munirka 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In Munirka 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Munirka 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Genesis 1:6 || Meditate the Scripture daily verse by verse
Genesis 1:6  ||  Meditate the Scripture daily verse by verseGenesis 1:6  ||  Meditate the Scripture daily verse by verse
Genesis 1:6 || Meditate the Scripture daily verse by verse
 
08448380779 Call Girls In Chirag Enclave Women Seeking Men
08448380779 Call Girls In Chirag Enclave Women Seeking Men08448380779 Call Girls In Chirag Enclave Women Seeking Men
08448380779 Call Girls In Chirag Enclave Women Seeking Men
 
9 Days Kenya Ultimate Safari Odyssey with Kibera Holiday Safaris
9 Days Kenya Ultimate Safari Odyssey with Kibera Holiday Safaris9 Days Kenya Ultimate Safari Odyssey with Kibera Holiday Safaris
9 Days Kenya Ultimate Safari Odyssey with Kibera Holiday Safaris
 
Hire 💕 8617697112 Champawat Call Girls Service Call Girls Agency
Hire 💕 8617697112 Champawat Call Girls Service Call Girls AgencyHire 💕 8617697112 Champawat Call Girls Service Call Girls Agency
Hire 💕 8617697112 Champawat Call Girls Service Call Girls Agency
 
visa consultant | 📞📞 03094429236 || Best Study Visa Consultant
visa consultant | 📞📞 03094429236 || Best Study Visa Consultantvisa consultant | 📞📞 03094429236 || Best Study Visa Consultant
visa consultant | 📞📞 03094429236 || Best Study Visa Consultant
 
Call Girls 🫤 Connaught Place ➡️ 9999965857 ➡️ Delhi 🫦 Russian Escorts FULL ...
Call Girls 🫤 Connaught Place ➡️ 9999965857  ➡️ Delhi 🫦  Russian Escorts FULL ...Call Girls 🫤 Connaught Place ➡️ 9999965857  ➡️ Delhi 🫦  Russian Escorts FULL ...
Call Girls 🫤 Connaught Place ➡️ 9999965857 ➡️ Delhi 🫦 Russian Escorts FULL ...
 
char Dham yatra, Uttarakhand tourism.pptx
char Dham yatra, Uttarakhand tourism.pptxchar Dham yatra, Uttarakhand tourism.pptx
char Dham yatra, Uttarakhand tourism.pptx
 
Night 7k Call Girls Noida Sector 93 Escorts Call Me: 8448380779
Night 7k Call Girls Noida Sector 93 Escorts Call Me: 8448380779Night 7k Call Girls Noida Sector 93 Escorts Call Me: 8448380779
Night 7k Call Girls Noida Sector 93 Escorts Call Me: 8448380779
 
BERMUDA Triangle the mystery of life.pptx
BERMUDA Triangle the mystery of life.pptxBERMUDA Triangle the mystery of life.pptx
BERMUDA Triangle the mystery of life.pptx
 
Study Consultants in Lahore || 📞03094429236
Study Consultants in Lahore || 📞03094429236Study Consultants in Lahore || 📞03094429236
Study Consultants in Lahore || 📞03094429236
 
Rohini Sector 18 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 18 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 18 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 18 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
💕📲09602870969💓Girl Escort Services Udaipur Call Girls in Chittorgarh Haldighati
💕📲09602870969💓Girl Escort Services Udaipur Call Girls in Chittorgarh Haldighati💕📲09602870969💓Girl Escort Services Udaipur Call Girls in Chittorgarh Haldighati
💕📲09602870969💓Girl Escort Services Udaipur Call Girls in Chittorgarh Haldighati
 

M2M, IoT and Security: a Market Overview

  • 1. M2M and IoT Markets Godfrey Chua, Principal Analyst Machina Research Security of Things Forum Cambridge, MA September 2015
  • 2. M2M connections will grow from 5 billion in 2014 to 27 billion in 2024 • Machina Research defines M2M as “Connections to remote sensing, monitoring and actuating devices, together with associated aggregation devices” • Based on this definition there were 5 billion M2M connections in 2014 and there will be 27 billion in 2024, a CAGR of 18% Machina Research 2 Global machine-to-machine connections 2014-24 Source: Machina Research 2015 Note: in this edition our Global M2M report, as in the previous editions, we have included in-building network infrastructure within our definition of M2M. As such, devices such as residential modems/ routers are included.
  • 3. Short-range technologies will dominate M2M • Over two-thirds of connections in 2024 will be short range (e.g. in-building PLC, WiFi, Zigbee, Z-Wave) • 14% of connections in 2024 will be LPWA, driven by the simplicity of deployment Machina Research 3 Global M2M connections 2014-2024 by technology Source: Machina Research 2015
  • 4. Wide area M2M connections will be dominated by LPWA technologies • By 2024, almost half of wide area M2M connections will be supported by LPWA technologies • LPWA technologies are attractive due to: o ease of deployment o homogeneity of solution o low price and long battery life • Cellular connections account for almost one-third because as well as the first two benefits they also deliver high capacity and mobility Machina Research 4 Wide area M2M connections by technology, 2014-24 Source: Machina Research 2015
  • 5. M2M accounted for 4% of cellular connections in 2014, rising to 18% in 2024 • At the end of 2014 there were over 250 million cellular M2M connections • By 2024 M2M’s share of cellular connections will have increased to nearly 1 in 5 • M2M accounts for nearly half of the growth in cellular connections from 2014-24 Machina Research 5 Machine-to-machine’s share of cellular connected devices, 2014-2024 Source: Machina Research 2015 0% 2% 4% 6% 8% 10% 12% 14% 16% 18% 20% - 3 6 9 12 15 Handset/Tablet PC/Laptop M2M % M2M
  • 6. Connected Car will account for 52% of cellular connections in 2024 • The top application groups for cellular connections will be: o Connected Car o Connected Living and Working • The Connected Car is top because it needs features only cellular can provide: o Comprehensive coverage o High-speed mobility o High bandwidth Machina Research 6 Machine-to-machine cellular connections by biggest applications, 2024 Source: Machina Research 2015
  • 7. M2M and IoT solutions are complex and made up of several components Devices Networks Platforms Internet of Things Connected things, products, systems, applications, etc. Security Storage ApplicationsData Processing Machina Research 7
  • 8. M2M and IoT SECURITY must encompass all components Devices Networks Platforms Internet of Things Connected things, products, systems, applications, etc. Security Storage ApplicationsData Processing Machina Research 8
  • 9. Security is a top of mind concern Machina Research 9 Source: Xively and Machina Research Survey 2015
  • 10. Some key elements in security • Data security and privacy • Lightweight device controllers • Firmware security updates • Pervasiveness • Passwords (and the human element) Machina Research 10
  • 11. Key considerations in security • Must be built into the business case o Align security efforts with business value • Partner collaboration is essential o Overall solution security is only as strong as the weakest link • Contingency planning o Is 100% security truly possible? Machina Research 11
  • 12. Machina Research 12 Thank you! Godfrey Chua Email: godfrey.chua@machinaresearch.com Twitter: gsc_IoT