Market for Artificial Intelligence in Internet of Things (IoT) Security and Fraud Prevention 2016 - 2021

Published: August 2016   Pages: 83
License Types Available

Choose an Option Below

Other Ordering Options


Artificial Intelligence (AI) is rapidly becoming integrated into many aspects of communication, applications, content, and commerce. The Internet of Things (IoT) is a particularly important area for AI as a means for safeguarding assets, reducing fraud, and supporting analytics and automated decision making. Mind Commerce estimates that global AI-based IoT anti-fraud and security intelligence solution revenue will reach nearly $1.5B USD by 2021.

This report evaluates that technologies, market opportunities, and outlook for AI-based security in IoT. The report includes analysis of AI in specific IoT deployment scenarios such as Fog Computing architectures. The report provides forecasting for 2016 to 2021.

Key Findings:

  • Intel’s acquisition of McAfee was a big mistake
  • Cylance is a key acquisition target for IoT security
  • Cisco is in the best position to capitalize on IoT security
  • APAC anti-fraud and security revenue will reach $459M by 2021
  • Global AI-based IoT security revenue will reach nearly $1.5B USD by 2021

Report Benefits:

  • AI security in IoT security and fraud prevention 2016 – 2021
  • Learn about the relationship of IoT security to IoT Policy Management
  • Understand the architecture, planning, and engineering issues for IoT security
  • Identify opportunities for AI-based IoT security solutions in distributed computing
  • Understand the strategy to lead with IoT security and evolve towards other services

Target Audience:

  • AI companies
  • Security companies
  • Wireless device manufacturers
  • Telephony infrastructure providers
  • Computer and semiconductor companies
  • Embedded hardware, software and OS providers
  • Wireless network operators and service providers

Table of Contents:

1 Introduction
2 Executive Summary
3 Overview 9
3.1 Cyber Security
3.2 Ramification of Cyber Security Threats
3.3 Internet of Things
3.4 General IoT Security Concerns
3.5 IoT Security Focus Areas
3.6 Distributed IoT: Fog Computing
3.6.1 Edge Computing
3.6.2 Edge Computing vs. Cluster Computing
3.6.3 Mobile Edge Computing
3.6.4 Fog Computing
3.6.5 Cloud Computing vs. Fog Computing
3.7 Specific Security Concerns with Fog Computing
4 Security Solutions in IoT
4.1 Challenges in Developing Security Solutions for IoT
4.1.1 Multivendor Nature of IoT Business
4.1.2 Lack of Standard Security Practices
4.1.3 Existing IoT Devices lack Robust Security
4.1.4 Security Threats are becoming Increasingly Sophisticated
4.1.5 IoT Data is a Bigger Concern than Equipment
4.2 Solution Areas for Securing IoT
4.3 General Steps to Secure IoT
4.3.1 Securing Device
4.3.2 Using Secure Communication Protocols
4.3.3 Securing and Protecting Data
4.4 General IoT Security Measures
4.4.1 Convergence of IT and OT Security Policies
4.4.2 Securing Mobile Devices and Applications
4.4.3 Securing IoT Cloud Infrastructure
4.5 IoT Security Issues that Drive the Need for AI
4.5.1 Fog Computing Security Concerns: An Evolving Issue
4.5.2 Beyond Safeguarding Assets: The Role of AI in Analytics and Decision Making
5 AI-based IoT Security Solution Forecasts 2016 - 2021
5.1 Global AI based Security Solutions in IoT Forecasts 2016 - 2021
5.2 Regional AI based Security Solutions in IoT Forecasts 2016 - 2021
5.2.1 North America AI based Security Solutions in IoT 2016 - 2021
5.2.2 Europe AI based Security Solutions in IoT 2016 - 2021
5.2.3 APAC AI based Security Solutions in IoT 2016 - 2021
5.2.4 Middle East and Africa AI based Security Solutions in IoT 2016 - 2021
5.2.5 Latin America AI based Security Solutions in IoT 2016 - 2021
6 Security Companies Evaluated
6.1 ARM Holdings
6.2 Attivo Networks
6.3 Bastille
6.4 Black Duck Software
6.5 Check Point Software Technologies
6.6 Cisco Systems
6.7 Cylance
6.8 IBM Corporation
6.9 Infineon Technologies AG
6.10 Intel Security Group (McAfee)
6.11 Inside Secure SA
6.12 Mocana
6.13 Neustar
6.14 Overwatch
6.15 Spirent Security
6.16 Symantec
6.17 Trend Micro
6.18 TrustPoint IT
6.19 Wedge Networks
6.20 Wurldtech Security Technologies (GE)
7 Conclusions and Recommendations


Figure 1: Fog Computing
Figure 2: Fog Computing and Cloud Architecture
Figure 2: Security in Fog Computing


Table 1: Cyber Crime in Top 15 Countries
Table 2: Cyber Crime by Category
Table 3: IoT Security Challenges and Solution Areas
Table 4: Global AI based Security Market 2016 – 2021
Table 5: North America AI based Security Market 2016 – 2021
Table 6: Europe AI based Security Market 2016 – 2021
Table 7: APAC AI based Security Market 2016 – 2021
Table 8: ME & Africa AI based Security Market 2016 – 2021
Table 9: Latin America AI based Security Market 2016 – 2021


M2M and IoT


Artificial Intelligence
Back Top Home Sitemap