The IoT security opportunity: turning defence into attack
Access this insight with a Premium plan. Contact our sales team to get started.
Report details
The IoT security opportunity: turning defence into attack
The GSMA Intelligence IoT Enterprise Survey Q4 2018 revealed that security (along with integration with legacy systems and cost) is a top three IoT deployment challenge. Enterprises have high demands of the IoT ecosystem, expecting security to be a core capability of an IoT solution and relying on specialist third-party security consultants to address their security concerns. By 2025 IoT security revenue will account for a small proportion of overall IoT revenue, as security is often taken for granted or deemed a hygiene factor. However, the relatively low revenue contribution understates the actual importance of security given that it is an all-or-nothing factor.
Report details
The IoT security opportunity: turning defence into attack
Related research
Industry Checkpoint: IoT, Q1 2026
This edition of the Industry Checkpoint series focuses on IoT, highlighting how the market has changed in the last six months and its implications. The report considers four major developments: the ramping up of commercial services based on SGP.32; LoRaWAN IoT integrating with the cellular and satellite ecosystems; momentum building for commercial offerings integrating NTN and cellular IoT; and eRedCap being positioned as a cost-efficient path to 5G for the next generation of IoT devices.
Telco security governance and strategies: Asia Pacific
Cybersecurity is a shared responsibility, requiring operators to adopt a holistic approach that integrates technology, personnel and processes. To evaluate the cybersecurity governance and strategies of operators, GSMA Intelligence undertook a global survey involving 100 operators worldwide. This report provides an overview of the cybersecurity governance and strategies of operators in Asia Pacific.
IoT in a post-quantum world: coming sooner than you think
The benefits of quantum computing come from the order-of-magnitude increase in computational power compared to conventional computers. This enables a range of use cases from predictive analytics to pharmaceutical simulations. However, there are also risks, primarily related to security vulnerabilities. Overall, we estimate around 8% of IoT devices currently in active use are quantum safe. Conversely, over 90% (i.e. nearly all) of IoT devices are exposed. The exposure risk for telcos comes at multiple levels, including networks, billing systems, consumer devices and IoT. The focus in this report is on the IoT dimension because it represents the largest universe of devices, is highly disparate and is particularly open to security risks due to the ageing nature of many assets deployed today.
Authors
How to access this report
Annual subscription: Subscribe to our research modules for comprehensive access to more than 200 reports per year.
Enquire about subscriptionContact our research team
Get in touch with us to find out more about our research topics and analysis.
Contact our research teamMedia
To cite our research, please see our citation policy in our Terms of Use, or contact our Media team for more information.
Learn moreRelated research
Industry Checkpoint: IoT, Q1 2026
This edition of the Industry Checkpoint series focuses on IoT, highlighting how the market has changed in the last six months and its implications. The report considers four major developments: the ramping up of commercial services based on SGP.32; LoRaWAN IoT integrating with the cellular and satellite ecosystems; momentum building for commercial offerings integrating NTN and cellular IoT; and eRedCap being positioned as a cost-efficient path to 5G for the next generation of IoT devices.
Telco security governance and strategies: Asia Pacific
Cybersecurity is a shared responsibility, requiring operators to adopt a holistic approach that integrates technology, personnel and processes. To evaluate the cybersecurity governance and strategies of operators, GSMA Intelligence undertook a global survey involving 100 operators worldwide. This report provides an overview of the cybersecurity governance and strategies of operators in Asia Pacific.
IoT in a post-quantum world: coming sooner than you think
The benefits of quantum computing come from the order-of-magnitude increase in computational power compared to conventional computers. This enables a range of use cases from predictive analytics to pharmaceutical simulations. However, there are also risks, primarily related to security vulnerabilities. Overall, we estimate around 8% of IoT devices currently in active use are quantum safe. Conversely, over 90% (i.e. nearly all) of IoT devices are exposed. The exposure risk for telcos comes at multiple levels, including networks, billing systems, consumer devices and IoT. The focus in this report is on the IoT dimension because it represents the largest universe of devices, is highly disparate and is particularly open to security risks due to the ageing nature of many assets deployed today.
- 200 reports a year
- 50 million data points
- Over 350 metrics
