The IoT security opportunity: turning defence into attack

The IoT security opportunity: turning defence into attack
This Report is locked

This report is available to those subscribed to the IoT & Enterprise module.

Learn more about our packages

The GSMA Intelligence IoT Enterprise Survey Q4 2018 revealed that security (along with integration with legacy systems and cost) is a top three IoT deployment challenge. Enterprises have high demands of the IoT ecosystem, expecting security to be a core capability of an IoT solution and relying on specialist third-party security consultants to address their security concerns. By 2025 IoT security revenue will account for a small proportion of overall IoT revenue, as security is often taken for granted or deemed a hygiene factor. However, the relatively low revenue contribution understates the actual importance of security given that it is an all-or-nothing factor.

Authors

How to access this report

Annual subscription: Subscribe to our research modules for comprehensive access to more than 200 reports per year.

Enquire about subscription

Contact our research team

Get in touch with us to find out more about our research topics and analysis.

Contact our research team

Media

To cite our research, please see our citation policy in our Terms of Use, or contact our Media team for more information.

Learn more

Related research

IoT and eSIM for digital industries: navigating enterprise needs, investments and supplier decisions

Internet of things (IoT)
eSIM
Digital industries
IoT & Enterprise

Digital transformation of vertical sectors is accelerating, with IoT being an important driver and enabler. GSMA Intelligence surveyed nearly 4,200 enterprises across 21 countries and 10 vertical sectors to gain relevant insights into their digital transformation across a range of technologies. This report analyses the key findings and implications for IoT and eSIM.

This report is locked

Towards a digital nation: addressing the scam economy in Asia Pacific

Public policy and regulation
Digital and economic inclusion
Security
Mobile Operators and Networks

The rapid expansion of digital technologies, and mobile connectivity in particular, has profoundly impacted scam techniques and their reach. All individuals with a mobile subscription – approximately 5.8 billion people – are potential targets for scams. Rises in the volume, frequency, sophistication and success rate of scams in recent years are having a significant financial impact on victims and the global economy.

This report is locked

How IoT adopters should navigate IoT network coverage and connectivity options

Internet of things (IoT)
IoT & Enterprise

Successful IoT deployment requires careful network selection, hardware planning, and ongoing connectivity management. Businesses must assess network coverage, roaming fees and SIM options while fostering strong relationships with IoT MVNOs or operators. Contingency plans are crucial, and so is access to reliable and regularly updated market intelligence as for IoT networks operation, network shutdown plans and hardware availability. This piece explores key factors shaping the availability of cellular IoT services and helps IoT adopters (both end-user industries and IoT device makers) to navigate the various options and make sense of latest market developments, such as AT&T’s NB-IoT exit and U-blox’s discontinuation of its cellular modules business.

This report is locked
Full access
Get full access to our research now, get in touch with us to find out more about our research topics and analysis
  • 200 reports a year
  • 50 million data points
  • Over 350 metrics