IoT can be defined as an interconnected system in which devices are connected using network communication technologies. The IoT security market includes solutions and services that are provided to secure the network of connected devices, such as smartphones, tablets, critical infrastructures, smart glass, connected automobile, and thermostats, and to minimize the losses caused due to threats and cyber-attacks on connected devices.

COMPETITIVE LEADERSHIP MAPPING TERMINOLOGY

The MicroQuadrant provides information about the major players that offer IoT security solutions and outlines the findings and analyses on how well each market vendor performs within specified criteria. The vendor evaluations are based on two broad categories: Product Offering and Business Strategy. Each category carries various criteria, based on which the vendors have been evaluated. The evaluation criteria considered under product offering include breadth of offering, feature and functionality, delivery (on the basis of the industries that the vendors cater to, deployment models, and subscriptions), scalability, and support (on the basis of pre-and post-sales support services). The evaluation criteria considered under business strategy include reach (on the basis of geographic presence), industry coverage (on the basis of end-users that the vendors cater to), channel, roadmap, and inorganic growth (on the basis of partnerships, collaborations, and acquisitions).

VISIONARY LEADERS

PTC Inc., Cisco Systems, Symantec Corporation, IBM Corporation, Gemalto, and TrendMicro lead in the IoT security solution segment and are recognized as the visionary leaders. They have a strong IoT security portfolio and offer highly customized and easily deployable software for commercial clients. These companies have robust business strategies to achieve constant growth in the market and have been at the forefront of new development and ideas.

INNOVATORS

Cloudflare, Inc., Device Authority Ltd., ZingBox, Infineon Technologies, and Wind River Systems are recognized as the innovators in the security solution segment. They have a robust portfolio of IoT security solutions and high potential to build business strategies to grow and be at par with the vanguards. Innovators have been at the forefront for deploying solutions for small and big, and custom projects by clients, which requires processing of high-performance workloads.

DYNAMIC Differentiators

Verizon Enterprise Solutions, Bitdefender, Sophos, Secure RV Inc., Arxan Technologies, Inc. and AT&T Inc. are recognized as the dynamic players in the IoT security solution segment. They have a focused portfolio of solutions and an extensive network of channel partners and resellers to increase the deployment of their solutions across a multitude of vertical markets. Dynamic vendors have been consistently generating positive revenue growth in the IoT security arena, and their market position is boosted by organic and inorganic ventures undertaken by them.

EMERGING COMPANIES

Trustwave Holdings, Check Point Software Technologies, Happiest Minds, Inside Secure, Cyber X, PFP Cybersecurity, Trillium, Icon Labs, and DigiCert are recognized as the emerging players in the IoT security market. The emerging players specialize in offering niche and tailor-made solutions to their clients. Emerging vendors have been undertaking multiple acquisitions and boosting their sales capabilities in different regions to offer integrated solutions to a wide range of clients.

TOP VENDORS
In Internet of Things (IoT) Security Solutions

  1. CISCO SYSTEMS INC
    0 Reviews
    3.8
  2. IBM CORPORATION
    0 Reviews
    3.6
  3. PTC INC
    0 Reviews
    3.5

Find the best Internet of Things (IoT) Security Solutions solution for your business, using ratings and reviews from buyers, analysts, vendors and industry experts

Internet of Things (IoT) Security Solutions Quadrant

Comparing [object Object] vendors in Internet of Things (IoT) Security Solutions across 95 criteria.

KEY BUYING CRITERIA

Below criteria are most commonly used for comparing Internet of Things (IoT) Security Solutions tools.
Product Maturity
Company Maturity
Most IMPORTANT
0.0
0.0
0.0
Breadth and Depth of Product Offerings
3.75
3.70
3.55
Product Features and Functionality
3.75
3.75
4.00
Delivery
3.65
3.05
2.05
Scalability
3.50
3.50
2.35
Support and Services
3.75
3.35
3.35
LEAST IMPORTANT LESS IMPORTANT

TOP VENDORS

  • Cisco provides several security solutions to fulfill the security needs of both physical devices as well as cyber security environment. The company helps organizations to deploy security solutions with centralized management across the network. Organizations can also ensure the fulfillment of the specific need of physical and cyber security environments and enforce separate security policies. The company provides end-to-end management of IoT systems by offering solutions for network connectivity, fog applications, data analytics, security (cyber and physical), management and automation, and application platform. The Cisco IoT system makes it possible to bring integration, analytics, and security to IoT infrastructure. The company’s security services help secure cyber and physical assets and prevent disruptions by analyzing risk profiles and implementing cybersecurity and physical security mechanisms to reduce the risk.

    BUYERS
    VENDORS
    EXPERTS
    3.8
    ANALYSTS
     
    • Enterprise
    • California, US
    • Founded: 1984
    • S10BN to $50BN
    • 50,001 to 75,000
  • IBM offers a wide range of products and solutions in the IoT security market. IBM Watson platform offers built-in security to its commercial clients. This security has been audited by a third-party firm to ensure compliance with ISO standards. The IBM Watson security allows to configure and manage the roles, enabling controls to be defined for users, applications, and gateways. IBM also offers an advanced security service called threat intelligence to its commercial clients, which extends the security capabilities of IBM Watson. In the field of threat intelligence, IBM offers a range of solutions to integrate with its QRadar family, IBM security access manager, IBM security identifies manager, AppScan, and others.

    BUYERS
    VENDORS
    EXPERTS
    3.6
    ANALYSTS
     
    • Enterprise
    • New York, US
    • Founded: 1911
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • In IoT security, the company operates with its dedicated IoT security product, Axeda. Axeda helps integrate an end-to-end security mechanism, which spans all levels of an IoT framework namely: network, application, end-user, and data security. Axeda has received ISO 27001:2013 certification, which depicts company’s focus on providing the optimum level of security and performance. Additionally, Axeda M2M cloud service helps maintain network security at the client location, protects data from unauthorized entities, facilitates with secure infrastructure, ensures user authentication, user access control management, and ensures granular policy management.

    BUYERS
    VENDORS
    EXPERTS
    3.5
    ANALYSTS
     
    • Enterprise
    • Needham, Massachusetts, US
    • Founded: 1985
    • $1BN to $5BN
    • 5,001 to 10,000
  • Security is one of the key aspects when it comes to an IoT infrastructure where multiple endpoints, servers, gateways, and other elements of the IoT ecosystem are prone to threats from several malicious attacks. The company offers various products and solutions for data and information theft protection at multiple nodes such as endpoints, security over cloud, email security, IT management and security, embedded security, data center security, control compliance suite Symantec code signing certificates, and secure app service. To ensure the security of the information flowing across the IoT infrastructure, Symantec offers several information protection solutions such as data loss prevention, encryption, access management, and management of PKI services.

    BUYERS
    VENDORS
    EXPERTS
    3.2
    ANALYSTS
     
    • Enterprise
    • California, US
    • Founded: 1982
    • $1BN to $5BN
    • 10,001 to 15,000
  • Gemalto offers embedded software solution for consumer electronics and M2M, which helps Original Equipment Manufacturers (OEM’s) and Mobile Network Operators (MNOs) to overcome the security challenges, including intellectual property theft. The company also offers solutions for data encryption and cloud security. It provides a comprehensive portfolio of cloud service providers and enterprises to secure their enterprise and cloud assets. Its cloud-based licensing and entitlement solutions help technology companies to control the full potential of the cloud environment.

    BUYERS
    VENDORS
    EXPERTS
    3.2
    ANALYSTS
     
    • SME
    • Amsterdam, Netherlands
    • Founded: 2006
    • $51MN to $100MN
    • 10,001 to 15,000
  • The company offers its solutions in 3 major categories, namely, cloud security, endpoint security, and email and mobile security. In cloud security, the company offers 3 products: Trend Micro Deep security platform, Trend Micro smart protection, and network and cloud app security. In end-point security, the company offers solutions such as vulnerability protection, endpoint application control, data loss prevention, endpoint encryption, server protect for Windows/Netware, and server protects for Linux. In mobile security space, the company offers hosted email security, and interscan is messaging security to its commercial clients.

    BUYERS
    VENDORS
    EXPERTS
    3.1
    ANALYSTS
     
    • SME
    • Tokyo, Japan
    • Founded: 1988
    • $101MN to $500MN
    • 1,001 to 5,000
  • AT&T follows the layered approach for the implementation of IoT security solutions. The company considers 3 layers for the security of IoT ecosystem, namely, device layer, network layer, and application or data layer. For protecting the device layer, AT&T associates with device manufacturers to ensure the device security. It uses global Subscriber Identification Module (SIM), which provides a flexible and scalable level of security at the device level. For ensuring the security of network layer, AT&T offers products such as AT&T Virtual Private Network, AT&T NetBond, Commercial Connectivity Service (CCS), and custom and private Access Point Names (APNs).

    BUYERS
    VENDORS
    EXPERTS
    2.9
    ANALYSTS
     
    • Enterprise
    • Dallas, Texas, US
    • Founded: 1983
    • More than $100 BN
    • 1,00,001 to 5,00,000
  • Infineon Technologies offers a variety of IoT security products and services in its chip card and security segment by integrating security microcontrollers with security chips and security applications. Its OPTIGA solution, based on Trusted Platform Module (TPM), provides security for applications in embedded environments; the company keeps upgrading this solution with new and innovative improvements. It also offers a wide range of products and solutions, which includes authentication, boot process protection, secure communication, secure software and firmware update, stored data encryption and integrity protection, lifecycle management, and audit and accountability.

    BUYERS
    VENDORS
    EXPERTS
    2.7
    ANALYSTS
     
    • Enterprise
    • 501 to 1,000
  • BUYERS
    VENDORS
    EXPERTS
    2.6
    ANALYSTS
     
    • Enterprise
    • New York, New York, United States
    • Founded: 1976
    • $1BN to $5BN
    • 10,001 to 15,000
  • BUYERS
    VENDORS
    EXPERTS
    2.6
    ANALYSTS
     
    • SME
    • 501 to 1,000
  • The company offers mobility products and services which include mobile workforce management, mobile application management, M2M solutions, cloud solutions comprising cloud and data center, and security services. In the IoT security space, the company provides products such as cloud security, identity and access management, threat and vulnerability, and risk and compliance. Furthermore, the company also offers software-defined perimeter service, a Software-as-a-Service (SaaS) solution which provides authorized, content-monitored, and secure access to enterprise applications and allows users to identify and avoid cyberattacks by making a virtual boundary around the network.

    BUYERS
    VENDORS
    EXPERTS
    2.6
    ANALYSTS
     
    • Enterprise
    • New York, US
    • Founded: 2000
    • More than $100 BN
    • 1,00,001 to 5,00,000
  • BUYERS
    VENDORS
    EXPERTS
    2.5
    ANALYSTS
     
    • Enterprise
    • Mountain View, California, US
    • Founded: 2014
    • 51 to 100
  • BUYERS
    VENDORS
    EXPERTS
    2.5
    ANALYSTS
     
    • Startup
    • San Francisco, California, US
    • Founded: 2001
    • $11MN to $50MN
    • 51 to 100
  • BUYERS
    VENDORS
    EXPERTS
    2.5
    ANALYSTS
     
    • Enterprise
    • 501 to 1,000
  • BUYERS
    VENDORS
    EXPERTS
    2.4
    ANALYSTS
     
    • Enterprise
    • 501 to 1,000
  • In IoT security space, the company offers various solutions and services to its commercial clients. These solutions include provisioning and deployment, device identity management, data and system integrity, and secure hosted security module solution for private key management. The company’s product offerings are categorized as per industries, namely, healthcare, automotive, industrial, smart city, home and consumer, transportation. It also provides high-volume certificate issuance platform, which can be used to manage the lifecycle of the connected devices.

    BUYERS
    VENDORS
    EXPERTS
    2.4
    ANALYSTS
     
    • Enterprise
    • 501 to 1,000
  • BUYERS
    VENDORS
    EXPERTS
    2.3
    ANALYSTS
     
    • Startup
    • San Francisco, California, US
    • Founded: 2009
    • $11MN to $50MN
    • 1 to 50
  • BUYERS
    VENDORS
    EXPERTS
    2.2
    ANALYSTS
     
    • Enterprise
    • Oxfordshire, UK
    • Founded: 1985
    • $500MN to $1BN
    • 1,001 to 5,000
  • BUYERS
    VENDORS
    EXPERTS
    2.2
    ANALYSTS
     
    • Startup
    • Massachusetts, US
    • Founded: 2013
    • Below $10 MN
    • 51 to 100
  • Check Point Security has been contributory toward providing customers with optimum protection against all types of threats, intrusions, and malicious attacks with its vast set of products, solutions, and services to deal with the network and mobile security. The company’s threat prevention products help increase enterprise security and deliver a multi-layered line of defense to maximize security. Hackers constantly change their techniques to avoid detection and reach valuable information, to deal with this, the company offers SandBlast Zero-day protection, which provides a detailed inspection to prevent complex malware and zero-day attacks and ensures quick delivery of safe content to the intended end-users.

    BUYERS
    VENDORS
    EXPERTS
    2.1
    ANALYSTS
     
    • Enterprise
    • 501 to 1,000
  • BUYERS
    VENDORS
    EXPERTS
    2.0
    ANALYSTS
     
    • Enterprise
    • 501 to 1,000
  • BUYERS
    VENDORS
    EXPERTS
    2.0
    ANALYSTS
     
    • SME
    • 501 to 1,000
  • BUYERS
    VENDORS
    EXPERTS
    1.9
    ANALYSTS
     
    • Enterprise
    • West Des Moines, Iowa, US
    • Founded: 1992
    • 51 to 100
  • BUYERS
    VENDORS
    EXPERTS
    1.7
    ANALYSTS
     
    • Startup
    • Ismaning, Bayern, Germany
    • Founded: 1985
    • $11MN to $50MN
    • 51 to 100
  • BUYERS
    VENDORS
    EXPERTS
    1.5
    ANALYSTS
     
    • Enterprise
    • 501 to 1,000
  • The company offers several services for security and prevention of intrusions and data theft in the IoT network. Trustwave Threat Management services help effectively prevent newer and targeted threats designed to steal valuable information related to business, customer database, and payment card data. Company’s threat management service gives better operational insight, quicker detection, real-time protection, and better threat mitigation approaches. The threat management services help carry out threat analysis and security analytics and provide actionable insight based on threat intelligence.

    BUYERS
    VENDORS
    EXPERTS
    1.5
    ANALYSTS
     
    • SME
    • 501 to 1,000

POTENTIAL BUYERS AND THEIR PROBLEMS

 

Questions & Answers

TOP REVIEWS

Looking for Internet of Things (IoT) Security Solutions? Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.