As organizations begin to connect their internal processes and machines to the Internet, security remains weak on account of multiple factors including cost and the lack of adequate solutions, notes the market research firm, expanding the landscape of problems, adding to known risks and offering an even bigger market for security startups.
“Connected consumer and business products have begun flooding the market, but security has been an afterthought. The world now has to figure out how to secure the multitude of things that have recently become connected,” says Mark Bünger, Lux Research Vice President and lead author of the report titled, “Cybersecurity Venture Investment in Pervasive Computing and in the IoT.”
“Unlike the hacking of credit card numbers and Hollywood feature films, these attacks have more dangerous consequences and threaten the integrity of critical infrastructure,” he emphasizes.
Lux Research analysts studied funding of cyberphysical security firms, notably by venture finance firms, and the startup environment.
They found that the United States accounts for nearly half of the IoT security startups, while a third are headquartered in Israel. Together, 77 startups assessed by Lux have raised $808 million since 2000, with many receiving no venture capital funding.
Platforms are a prime focus, with more than half of the companies aiming to provide horizontal security platforms capable of supporting multiple types of IoT devices and environments.
Securing industrial control system networks is a huge initiative across the IoT security landscape while securing the connected car is also a hot spot.
New areas of innovation for cyber-threat countermeasures include device behaviour analysis, network behaviour analysis, and combinations of the two approaches, the focus being on performing authentication and encryption in supervised and untampered IoT environments.
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.