• Newsletter
  • Contact
  • Press Releases
Friday, May 22, 2026
Stay Ahead with Heaptalk: Your Go-To Source for Business News
  • Login
  • Register
  • Whats on
  • News
  • Events
  • Technology
  • Industry
  • GovAct
  • Expert Talk
  • Insight
  • Sustainability
No Result
View All Result
Stay Ahead with Heaptalk: Your Go-To Source for Business News
  • Whats on
  • News
  • Events
  • Technology
  • Industry
  • GovAct
  • Expert Talk
  • Insight
  • Sustainability
No Result
View All Result
Stay Ahead with Heaptalk: Your Go-To Source for Business News
No Result
View All Result
Home Press Release

Safeguarding a 70 Billion Connected IoT Device Landscape by 2026 Requires an Advanced Three-Pronged Device-to-Cloud Security Approach

Sinta by Sinta
July 2, 2024
in Press Release
0
Share on FacebookShare on Twitter

NEW YORK, Jan. 18, 2024 – The number of Internet of Things (IoT) end-user devices and IoT edge nodes such as home appliances, personal wearables, industrial robots, and even connected drones is quickly increasing. Global technology intelligence firm ABI Research forecasts that by 2026, the installed base of connected devices will reach more than 70 billion installations, creating an expansive IoT attack vector in the IoT environment. Most of these devices are low-power, storage limited, and with weak computational power, which means these devices are increasingly connecting to the cloud environment for centralized storage, data analytics, real-time monitoring, remote access, and updates in firmware and software. Connecting to the cloud environment creates yet another compromise vector for these devices.  An effective IoT device-to-cloud security strategy should target security in three vital areas: device, network, and cloud.

“Device security often means securing the chipset and the data stored inside the device from being breached. Network security securely transfers data between the IoT device and the cloud. Cloud security allows the data to avoid intrusion while sitting in the cloud,” says Michael Amiri, Senior Industrial and IoT Cybersecurity Analyst at ABI Research. Vendors such as  Palo Alto Networks offer visibility into the cloud environment. Its Prisma Cloud solution provides cloud threat visibility, while its Networks Enterprise IoT security focuses on zero-trust frameworks to address IoT device vulnerabilities.  Ayla Networks is an IoT platform provider offering end-to-end software and cloud-based services. Its IoT platform is another cybersecurity offering that addresses device and cloud security by maintaining the integrity of cloud connectivity, providing data analytics, and allowing device manufacturers to connect their IoT portfolios more securely to cloud networks.

In addition to embedded security in device design and cloud provider security offerings, end-users need to ensure the implementation of robust authentication practices, especially given the nature of remote access and remote work regarding the IoT environment. In such an environment, Amiri explains, “Security vendors need to include cloud security solutions at the forefront of their marketing strategies. Emphasizing cloud solutions is fundamental in a market where IoT devices increasingly rely on the cloud for storage, data handling, computation, remote management, and updates.” Digicert provides IoT threat detection, offering secure keys through on-premises or cloud-based Hardware Security Modules (HSMs) and generates comprehensive Software Bill of Materials (SBOM) to access visibility into software deployed in the IoT environment. Infineon’s CIRREN Cloud ID chip-to-cloud-security solution extends trust from IoT device chips to the cloud, offering public key certificates via the CIRRENT console.

IoT security technology is already experiencing a surge in demand, which will probably accelerate if new regulations for IoT and cloud connections are passed. A case in point is a recent Software Bill of Materials (SBOMs) mandate for medical device manufacturers in the U.S. ABI Research spoke to SBOM service providers, and they unanimously believe regulation has been a significant driver for their services.

“An explosive increase in IoT connections and devices is evident in the next three to four years. North America and the Asia region show the highest level of growth, followed by Western Europe. These will be the largest markets for IoT and cloud security solutions. Traditional markets for IoT security solutions have been the consumer, financial, enterprise, and government verticals. Yet automobile, healthcare, and manufacturing have seen a strong push for IoT security,” Amiri concludes.

These findings are from ABI Research’s  Device to Cloud: Security for IoT Device Management application analysis report. This report is part of the company’s Industrial Cybersecurity research service, which includes research, data, and analyst insights. Based on extensive primary interviews, Application Analysis reports present an in-depth analysis of key market trends and factors for a specific technology.

Tags: press release

Related Posts

Indonesia Sets USD 17.5 Billion Target for 41st Trade Expo Indonesia 2026

Indonesia Sets USD 17.5 Billion Target for 41st Trade Expo Indonesia 2026

February 26, 2026
Datacenter Innovation Series India 2026

Datacentre Innovation Series 2026: Pioneering the Future of Digital Infrastructure

April 10, 2026

Datacentre Innovation Series 2025: Pioneering the Future of Digital Infrastructure

November 3, 2025
Trade Expo Indonesia

The 40th TEI Officially Opens, Presenting the Limitless Excellence of Indonesian Products

October 15, 2025
IBTE 2025

IBTE 2025: The Leading Business Platform for Baby Products and Toy Industry in Southeast Asia

August 26, 2025
IBTE 2025: The Premier Business Platform for Baby Products and Toys Industry in Southeast Asia

IBTE 2025: The Premier Business Platform for Baby Products and Toys Industry in Southeast Asia

August 26, 2025
Seedbacklink
Heaptalk business news logo

We Build an Ecosystem by Sharing Business News, Headlines and Expert Talks in Professional Perspective and Positive Point of View. Latest business news media headlines platform today.

Recent Posts

  • Da Vinci Single Port Robotic Surgery: One Incision. Infinite Precision.
  • The Stranglehold at the Strait: How a Distant War Is Quietly Breaking Southeast Asia’s Economy
  • Indonesia Sets USD 17.5 Billion Target for 41st Trade Expo Indonesia 2026
  • Datacentre Innovation Series 2026: Pioneering the Future of Digital Infrastructure
  • Global Youth Diplomacy: 1,200 Delegates Convene for the 20th AYIMUN in Kuala Lumpur

Follow Us

Facebook
Twitter
LinkedIn Youtube Instagram RSS

Newsletter

  • About Us
  • Editorial
  • Newsletter
  • Contact
  • Privacy Policy
  • Cyber Media Guidelines
  • Disclaimer
  • SOP Perlindungan Wartawan

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • News
  • Technology
  • Industry
  • GovAct
  • Events
  • Whats on
  • Expert Talk
  • Insight
  • Video
  • Sustainability
  • Newsletter
  • Press Releases
  • Login
  • Sign Up

© 2024 Heaptalk.com

Go to mobile version