IoT security for enterprises: make it work, make it easy

IoT security for enterprises: make it work, make it easy
This insight is locked

This insight is open to all subscribers and registered users, or available by completing the form below.

Report details

IoT security for enterprises: make it work, make it easy
Pages
13
Released
DECEMBER 2020

Understanding of IoT security among enterprises is on the rise. A higher proportion of enterprises rate security as a key purchasing factor in 2020 compared to 2018. This increase in understanding also occurs at a time when enterprises are aiming to adopt a security-first approach as their USP. However, they are only at the start of this journey. When choosing vendors, they rely on who and what they know, and are not fully aware of the trade-offs needed to make an IoT solution secure. 

Together with Pelion, we examine enterprise attitudes to IoT security, as uncovered by the GSMA Intelligence Enterprise in Focus Survey. We focus on what enterprises currently perceive as important security features in IoT solutions, who they trust to deliver such features, and how eSIM is able to address IoT security challenges. 

Download the Report

Complete the form below to get instant access to this report. For easier access in the future, you can register for a free account here.

Opt-in for Marketing Communications:
To ensure you stay up-to-date on the latest developments in the mobile industry, GSMA Intelligence would like to send you information about events, products, services, and initiatives, as well as industry news. Please subscribe by ticking this box; once subscribed, you can tailor what you receive from us at any time, or unsubscribe, should you wish.

Authors

How to access this report

Annual subscription: Subscribe to our research modules for comprehensive access to more than 200 reports per year.

Enquire about subscription

Contact our research team

Get in touch with us to find out more about our research topics and analysis.

Contact our research team

Media

To cite our research, please see our citation policy in our Terms of Use, or contact our Media team for more information.

Learn more

Related research

IoT in a post-quantum world: coming sooner than you think

Topics
Security
Internet of things (IoT)

The benefits of quantum computing come from the order-of-magnitude increase in computational power compared to conventional computers. This enables a range of use cases from predictive analytics to pharmaceutical simulations. However, there are also risks, primarily related to security vulnerabilities. Overall, we estimate around 8% of IoT devices currently in active use are quantum safe. Conversely, over 90% (i.e. nearly all) of IoT devices are exposed. The exposure risk for telcos comes at multiple levels, including networks, billing systems, consumer devices and IoT. The focus in this report is on the IoT dimension because it represents the largest universe of devices, is highly disparate and is particularly open to security risks due to the ageing nature of many assets deployed today.

This insight is locked

The telco threat landscape and security strategies in Europe

Topic
Security

Over the past few years, AI has started to transform industries across Europe and around the world. However, alongside the positive impact of AI-driven innovation has been a wave of new, sophisticated and unpredictable cyberthreats.

This insight is locked

Telco security in Qatar: an asset-driven response

Topics
Mobile networks and connectivity
Security

As 5G becomes the foundation of Qatar's digital economy (powering finance, e-government, smart transport and critical infrastructure), the importance of securing networks extends beyond consumer protection to national security and economic stability.

This insight is locked
Full access
Get full access to our research now, get in touch with us to find out more about our research topics and analysis
  • 200 reports a year
  • 50 million data points
  • Over 350 metrics