Internet of Things (IoT) Security Solutions in Consumer Wearables


Consumer wearables consist of 4 major types, namely, wrist wear, eyewear, neckwear, and body wear. Wrist wear consists of smartwatches and wristbands. Eyewear includes Virtual Reality (VR) and Augmented Reality (AR) headsets; neckwear comprises fashion, jewellery, smart ties, and collars. Similarly, body wear includes smart innerwear, fashion, apparel, arm wear, and legwear. In addition, consumer wearables include ring scanners, body worn cameras, and special-purpose footwear. All these devices are installed with heterogeneous platforms such as Android Wear OS, Linux, Pebble OS, Tizen, Real-Time Operating System (RTOS), and WatchOS. Consumer wearables are vulnerable and more susceptible to cyber-attacks and IoT security vendors find a great opportunity to address the security needs of these consumer wearables. For instance, fitness trackers provide a geolocation of the user and the data is uploaded minute by minute to the cloud. Hacking of this data can be very dangerous, as a user can be tracked anytime anywhere. As the wearables are usually connected to a variety of cloud apps, depending on an enterprise’s BYOD policy and its network can be a vulnerable point for a cyber-attack. This means that malware and other forms of attacks can use that path to get inside an organization’s network and can hack other IoT devices as well.

TOP VENDORS
In Internet of Things (IoT) Security Solutions

  1. ARXAN TECHNOLOGIES
    Reviews
    0.0
  2. AT&T INC
    Reviews
    0.0
  3. BITDEFENDER
    Reviews
    0.0

Internet of Things (IoT) Security Solutions in Consumer Wearables Quadrant

Comparing [object Object] vendors in Internet of Things (IoT) Security Solutions across 96 criteria.

Find the best Internet of Things (IoT) Security Solutions solution for your business, using ratings and reviews from buyers, analysts, vendors and industry experts

EVALUATION CRITERIA

Below criteria are most commonly used for comparing Internet of Things (IoT) Security Solutions tools.
Product Maturity
Company Maturity
Most IMPORTANT
0.0
0.0
0.0
Breadth and Depth of Product Offerings
3.75
3.70
3.55
Product Features and Functionality
3.75
3.75
4.00
Delivery
3.65
3.05
2.05
Scalability
3.50
3.50
2.35
Support and Services
3.75
3.35
3.35
LEAST IMPORTANT LESS IMPORTANT

TOP VENDORS

  • BUYERS
    VENDORS
    EXPERTS
    2.5
    ANALYSTS
     
    • Startup
    • San Francisco, California, US
    • Founded: 2001
    • $11MN to $50MN
    • 51 to 100
  • AT&T follows the layered approach for the implementation of IoT security solutions. The company considers 3 layers for the security of IoT ecosystem, namely, device layer, network layer, and application or data layer. For protecting the device layer, AT&T associates with device manufacturers to ensure the device security. It uses global Subscriber Identification Module (SIM), which provides a flexible and scalable level of security at the device level. For ensuring the security of network layer, AT&T offers products such as AT&T Virtual Private Network, AT&T NetBond, Commercial Connectivity Service (CCS), and custom and private Access Point Names (APNs).

    Read More
    BUYERS
    VENDORS
    EXPERTS
    2.9
    ANALYSTS
     
    • Enterprise
    • Dallas, Texas, US
    • Founded: 1983
    • More than $100 BN
    • 1,00,001 to 5,00,000
  • BUYERS
    VENDORS
    EXPERTS
    2.6
    ANALYSTS
     
    • SME
    • 501 to 1,000
  • BUYERS
    VENDORS
    EXPERTS
    2.6
    ANALYSTS
     
    • Enterprise
    • New York, New York, United States
    • Founded: 1976
    • $1BN to $5BN
    • 10,001 to 15,000
  • Cisco provides several security solutions to fulfill the security needs of both physical devices as well as cyber security environment. The company helps organizations to deploy security solutions with centralized management across the network. Organizations can also ensure the fulfillment of the specific need of physical and cyber security environments and enforce separate security policies. The company provides end-to-end management of IoT systems by offering solutions for network connectivity, fog applications, data analytics, security (cyber and physical), management and automation, and application platform. The Cisco IoT system makes it possible to bring integration, analytics, and security to IoT infrastructure. The company’s security services help secure cyber and physical assets and prevent disruptions by analyzing risk profiles and implementing cybersecurity and physical security mechanisms to reduce the risk.

    Read More
    BUYERS
    VENDORS
    EXPERTS
    3.8
    ANALYSTS
     
    • Enterprise
    • California, US
    • Founded: 1984
    • S10BN to $50BN
    • 50,001 to 75,000
  • BUYERS
    VENDORS
    EXPERTS
    2.4
    ANALYSTS
     
    • Startup
    • San Francisco, California, US
    • Founded: 2009
    • $11MN to $50MN
    • 1 to 50
  • BUYERS
    VENDORS
    EXPERTS
    2.0
    ANALYSTS
     
    • SME
    • 501 to 1,000
  • IBM offers a wide range of products and solutions in the IoT security market. IBM Watson platform offers built-in security to its commercial clients. This security has been audited by a third-party firm to ensure compliance with ISO standards. The IBM Watson security allows to configure and manage the roles, enabling controls to be defined for users, applications, and gateways. IBM also offers an advanced security service called threat intelligence to its commercial clients, which extends the security capabilities of IBM Watson. In the field of threat intelligence, IBM offers a range of solutions to integrate with its QRadar family, IBM security access manager, IBM security identifies manager, AppScan, and others.

    Read More
    BUYERS
    VENDORS
    EXPERTS
    3.6
    ANALYSTS
     
    • Enterprise
    • New York, US
    • Founded: 1911
    • $50BN to $100BN
    • 1,00,001 to 5,00,000
  • BUYERS
    VENDORS
    EXPERTS
    2.0
    ANALYSTS
     
    • Enterprise
    • West Des Moines, Iowa, US
    • Founded: 1992
    • 51 to 100
  • Infineon Technologies offers a variety of IoT security products and services in its chip card and security segment by integrating security microcontrollers with security chips and security applications. Its OPTIGA solution, based on Trusted Platform Module (TPM), provides security for applications in embedded environments; the company keeps upgrading this solution with new and innovative improvements. It also offers a wide range of products and solutions, which includes authentication, boot process protection, secure communication, secure software and firmware update, stored data encryption and integrity protection, lifecycle management, and audit and accountability.

    Read More
    BUYERS
    VENDORS
    EXPERTS
    2.7
    ANALYSTS
     
    • Enterprise
    • 501 to 1,000
  • BUYERS
    VENDORS
    EXPERTS
    2.0
    ANALYSTS
     
    • Enterprise
    • 501 to 1,000
  • In IoT security, the company operates with its dedicated IoT security product, Axeda. Axeda helps integrate an end-to-end security mechanism, which spans all levels of an IoT framework namely: network, application, end-user, and data security. Axeda has received ISO 27001:2013 certification, which depicts company’s focus on providing the optimum level of security and performance. Additionally, Axeda M2M cloud service helps maintain network security at the client location, protects data from unauthorized entities, facilitates with secure infrastructure, ensures user authentication, user access control management, and ensures granular policy management.

    Read More
    BUYERS
    VENDORS
    EXPERTS
    3.5
    ANALYSTS
     
    • Enterprise
    • Needham, Massachusetts, US
    • Founded: 1985
    • $1BN to $5BN
    • 5,001 to 10,000
  • BUYERS
    VENDORS
    EXPERTS
    2.4
    ANALYSTS
     
    • Enterprise
    • 501 to 1,000
  • BUYERS
    VENDORS
    EXPERTS
    2.3
    ANALYSTS
     
    • Enterprise
    • Oxfordshire, UK
    • Founded: 1985
    • $500MN to $1BN
    • 1,001 to 5,000
  • Security is one of the key aspects when it comes to an IoT infrastructure where multiple endpoints, servers, gateways, and other elements of the IoT ecosystem are prone to threats from several malicious attacks. The company offers various products and solutions for data and information theft protection at multiple nodes such as endpoints, security over cloud, email security, IT management and security, embedded security, data center security, control compliance suite Symantec code signing certificates, and secure app service. To ensure the security of the information flowing across the IoT infrastructure, Symantec offers several information protection solutions such as data loss prevention, encryption, access management, and management of PKI services.

    Read More
    BUYERS
    VENDORS
    EXPERTS
    3.3
    ANALYSTS
     
    • Enterprise
    • California, US
    • Founded: 1982
    • $1BN to $5BN
    • 10,001 to 15,000
  • The company offers its solutions in 3 major categories, namely, cloud security, endpoint security, and email and mobile security. In cloud security, the company offers 3 products: Trend Micro Deep security platform, Trend Micro smart protection, and network and cloud app security. In end-point security, the company offers solutions such as vulnerability protection, endpoint application control, data loss prevention, endpoint encryption, server protect for Windows/Netware, and server protects for Linux. In mobile security space, the company offers hosted email security, and interscan is messaging security to its commercial clients.

    Read More
    BUYERS
    VENDORS
    EXPERTS
    3.1
    ANALYSTS
     
    • SME
    • Tokyo, Japan
    • Founded: 1988
    • $101MN to $500MN
    • 1,001 to 5,000
  • The company offers several services for security and prevention of intrusions and data theft in the IoT network. Trustwave Threat Management services help effectively prevent newer and targeted threats designed to steal valuable information related to business, customer database, and payment card data. Company’s threat management service gives better operational insight, quicker detection, real-time protection, and better threat mitigation approaches. The threat management services help carry out threat analysis and security analytics and provide actionable insight based on threat intelligence.

    Read More
    BUYERS
    VENDORS
    EXPERTS
    1.5
    ANALYSTS
     
    • SME
    • 501 to 1,000
  • The company offers mobility products and services which include mobile workforce management, mobile application management, M2M solutions, cloud solutions comprising cloud and data center, and security services. In the IoT security space, the company provides products such as cloud security, identity and access management, threat and vulnerability, and risk and compliance. Furthermore, the company also offers software-defined perimeter service, a Software-as-a-Service (SaaS) solution which provides authorized, content-monitored, and secure access to enterprise applications and allows users to identify and avoid cyberattacks by making a virtual boundary around the network.

    Read More
    BUYERS
    VENDORS
    EXPERTS
    2.6
    ANALYSTS
     
    • Enterprise
    • New York, US
    • Founded: 2000
    • More than $100 BN
    • 1,00,001 to 5,00,000
  • BUYERS
    VENDORS
    EXPERTS
    2.5
    ANALYSTS
     
    • Enterprise
    • 501 to 1,000

POTENTIAL BUYERS AND THEIR PROBLEMS

 

Questions & Answers

TOP REVIEWS

Looking for Internet of Things (IoT) Security Solutions? Get help

BE THE FIRST ONE TO REVIEW

Share your experience with potential buyers.