SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
M2M and IoT Markets
Godfrey Chua, Principal Analyst
Machina Research
Security of Things Forum
Cambridge, MA
September 2015
M2M connections will grow from 5 billion
in 2014 to 27 billion in 2024
• Machina Research defines
M2M as “Connections to
remote sensing, monitoring
and actuating devices,
together with associated
aggregation devices”
• Based on this definition
there were 5 billion M2M
connections in 2014 and
there will be 27 billion in
2024, a CAGR of 18%
Machina Research 2
Global machine-to-machine connections
2014-24
Source: Machina Research 2015
Note: in this edition our Global M2M report, as in the previous
editions, we have included in-building network infrastructure
within our definition of M2M. As such, devices such as residential
modems/ routers are included.
Short-range technologies will dominate
M2M
• Over two-thirds of
connections in 2024
will be short range (e.g.
in-building PLC, WiFi,
Zigbee, Z-Wave)
• 14% of connections in
2024 will be LPWA,
driven by the simplicity
of deployment
Machina Research 3
Global M2M connections 2014-2024 by
technology
Source: Machina Research 2015
Wide area M2M connections will be
dominated by LPWA technologies
• By 2024, almost half of wide
area M2M connections will be
supported by LPWA
technologies
• LPWA technologies are
attractive due to:
o ease of deployment
o homogeneity of solution
o low price and long battery life
• Cellular connections account
for almost one-third because
as well as the first two
benefits they also deliver high
capacity and mobility
Machina Research 4
Wide area M2M connections by technology,
2014-24
Source: Machina Research 2015
M2M accounted for 4% of cellular
connections in 2014, rising to 18% in 2024
• At the end of 2014 there
were over 250 million
cellular M2M connections
• By 2024 M2M’s share of
cellular connections will
have increased to nearly 1
in 5
• M2M accounts for nearly
half of the growth in cellular
connections from 2014-24
Machina Research 5
Machine-to-machine’s share of cellular
connected devices, 2014-2024
Source: Machina Research 2015
0%
2%
4%
6%
8%
10%
12%
14%
16%
18%
20%
-
3
6
9
12
15
Handset/Tablet PC/Laptop
M2M % M2M
Connected Car will account for 52% of
cellular connections in 2024
• The top application groups
for cellular connections will
be:
o Connected Car
o Connected Living and
Working
• The Connected Car is top
because it needs features
only cellular can provide:
o Comprehensive coverage
o High-speed mobility
o High bandwidth
Machina Research 6
Machine-to-machine cellular connections by
biggest applications, 2024
Source: Machina Research 2015
M2M and IoT solutions are complex and
made up of several components
Devices
Networks
Platforms
Internet of
Things
Connected things,
products, systems,
applications, etc.
Security
Storage
ApplicationsData Processing
Machina Research 7
M2M and IoT SECURITY must encompass
all components
Devices
Networks
Platforms
Internet of
Things
Connected things,
products, systems,
applications, etc.
Security
Storage
ApplicationsData Processing
Machina Research 8
Security is a top of mind concern
Machina Research 9
Source: Xively and Machina Research Survey 2015
Some key elements in security
• Data security and privacy
• Lightweight device controllers
• Firmware security updates
• Pervasiveness
• Passwords (and the human element)
Machina Research 10
Key considerations in security
• Must be built into the business case
o Align security efforts with business value
• Partner collaboration is essential
o Overall solution security is only as strong as the
weakest link
• Contingency planning
o Is 100% security truly possible?
Machina Research 11
Machina Research 12
Thank you!
Godfrey Chua
Email: godfrey.chua@machinaresearch.com
Twitter: gsc_IoT

Contenu connexe

En vedette

Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...
Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...
Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...Business of Software Conference
 
Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016
Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016
Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016Business of Software Conference
 
Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016
Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016
Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016Business of Software Conference
 
Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...
Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...
Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...Business of Software Conference
 
Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016
Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016
Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016Business of Software Conference
 
B2B Webinar: Creating Your Digital Roadmap. Why Now?
B2B Webinar: Creating Your Digital Roadmap. Why Now?B2B Webinar: Creating Your Digital Roadmap. Why Now?
B2B Webinar: Creating Your Digital Roadmap. Why Now?CrossView
 
The Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsThe Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsParviz Iskhakov
 
Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devicesmentoresd
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 

En vedette (13)

Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...
Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...
Laura Roeder, Transitioning from a Consulting to a Product Business, BoS USA ...
 
Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016
Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016
Jana Eggers, What Do We Need to Know About AI?, BoS USA 2016
 
Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016
Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016
Promise Phelon, Perks vs Culture: The Ping Pong Table Fallacy, BoS USA 2016
 
Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...
Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...
Patrick Campbell, Why a SaaS Pricing Consultancy Gives Away Free Software, Bo...
 
Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016
Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016
Zack Urlocker, Scaling to a Billion and Beyond, BoS USA 2016
 
B2B Webinar: Creating Your Digital Roadmap. Why Now?
B2B Webinar: Creating Your Digital Roadmap. Why Now?B2B Webinar: Creating Your Digital Roadmap. Why Now?
B2B Webinar: Creating Your Digital Roadmap. Why Now?
 
The Internet of Things
The Internet of ThingsThe Internet of Things
The Internet of Things
 
The Digital Telecom. Internet of Things
The Digital Telecom. Internet of ThingsThe Digital Telecom. Internet of Things
The Digital Telecom. Internet of Things
 
Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devices
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 

Plus de The Security of Things Forum

Plus de The Security of Things Forum (6)

Securing the Fog
Securing the FogSecuring the Fog
Securing the Fog
 
Secure your Space: The Internet of Things
Secure your Space: The Internet of ThingsSecure your Space: The Internet of Things
Secure your Space: The Internet of Things
 
What is being exposed from IoT Devices
What is being exposed from IoT DevicesWhat is being exposed from IoT Devices
What is being exposed from IoT Devices
 
Securing Internet of Things with Trustworthy Computing
Securing Internet of Things with Trustworthy ComputingSecuring Internet of Things with Trustworthy Computing
Securing Internet of Things with Trustworthy Computing
 
SOHOpelessly Broken
SOHOpelessly BrokenSOHOpelessly Broken
SOHOpelessly Broken
 
The Harsh Reality of Slow Movers
The Harsh Reality of Slow MoversThe Harsh Reality of Slow Movers
The Harsh Reality of Slow Movers
 

Dernier

question 2: airplane vocabulary presentation
question 2: airplane vocabulary presentationquestion 2: airplane vocabulary presentation
question 2: airplane vocabulary presentationcaminantesdaauga
 
Aeromexico Airlines Flight Name Change Policy
Aeromexico Airlines Flight Name Change PolicyAeromexico Airlines Flight Name Change Policy
Aeromexico Airlines Flight Name Change PolicyFlyFairTravels
 
Hoi An Ancient Town, Vietnam (越南 會安古鎮).ppsx
Hoi An Ancient Town, Vietnam (越南 會安古鎮).ppsxHoi An Ancient Town, Vietnam (越南 會安古鎮).ppsx
Hoi An Ancient Town, Vietnam (越南 會安古鎮).ppsxChung Yen Chang
 
Sicily Holidays Guide Book: Unveiling the Treasures of Italy's Jewel
Sicily Holidays Guide Book: Unveiling the Treasures of Italy's JewelSicily Holidays Guide Book: Unveiling the Treasures of Italy's Jewel
Sicily Holidays Guide Book: Unveiling the Treasures of Italy's JewelTime for Sicily
 
a presentation for foreigners about how to travel in Germany.
a presentation for foreigners about how to travel in Germany.a presentation for foreigners about how to travel in Germany.
a presentation for foreigners about how to travel in Germany.moritzmieg
 
Italia Lucca 1 Un tesoro nascosto tra le sue mura
Italia Lucca 1 Un tesoro nascosto tra le sue muraItalia Lucca 1 Un tesoro nascosto tra le sue mura
Italia Lucca 1 Un tesoro nascosto tra le sue murasandamichaela *
 
Revolutionalizing Travel: A VacAI Update
Revolutionalizing Travel: A VacAI UpdateRevolutionalizing Travel: A VacAI Update
Revolutionalizing Travel: A VacAI Updatejoymorrison10
 
Moroccan Architecture presentation ( Omar & Yasine ).pptx
Moroccan Architecture presentation ( Omar & Yasine ).pptxMoroccan Architecture presentation ( Omar & Yasine ).pptx
Moroccan Architecture presentation ( Omar & Yasine ).pptxOmarOuazzani1
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)Mazie Garcia
 
Authentic Travel Experience 2024 Greg DeShields.pptx
Authentic Travel Experience 2024 Greg DeShields.pptxAuthentic Travel Experience 2024 Greg DeShields.pptx
Authentic Travel Experience 2024 Greg DeShields.pptxGregory DeShields
 
Where to Stay in Lagos, Portugal.pptxasd
Where to Stay in Lagos, Portugal.pptxasdWhere to Stay in Lagos, Portugal.pptxasd
Where to Stay in Lagos, Portugal.pptxasdusmanghaniwixpatriot
 
Haitian culture and stuff and places and food and travel.pptx
Haitian culture and stuff and places and food and travel.pptxHaitian culture and stuff and places and food and travel.pptx
Haitian culture and stuff and places and food and travel.pptxhxhlixia
 
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)Escort Service
 
How Safe Is It To Witness Whales In Maui’s Waters
How Safe Is It To Witness Whales In Maui’s WatersHow Safe Is It To Witness Whales In Maui’s Waters
How Safe Is It To Witness Whales In Maui’s WatersMakena Coast Charters
 
Inspirational Quotes About Italy and Food
Inspirational Quotes About Italy and FoodInspirational Quotes About Italy and Food
Inspirational Quotes About Italy and FoodKasia Chojecki
 

Dernier (17)

question 2: airplane vocabulary presentation
question 2: airplane vocabulary presentationquestion 2: airplane vocabulary presentation
question 2: airplane vocabulary presentation
 
Aeromexico Airlines Flight Name Change Policy
Aeromexico Airlines Flight Name Change PolicyAeromexico Airlines Flight Name Change Policy
Aeromexico Airlines Flight Name Change Policy
 
Hoi An Ancient Town, Vietnam (越南 會安古鎮).ppsx
Hoi An Ancient Town, Vietnam (越南 會安古鎮).ppsxHoi An Ancient Town, Vietnam (越南 會安古鎮).ppsx
Hoi An Ancient Town, Vietnam (越南 會安古鎮).ppsx
 
Sicily Holidays Guide Book: Unveiling the Treasures of Italy's Jewel
Sicily Holidays Guide Book: Unveiling the Treasures of Italy's JewelSicily Holidays Guide Book: Unveiling the Treasures of Italy's Jewel
Sicily Holidays Guide Book: Unveiling the Treasures of Italy's Jewel
 
a presentation for foreigners about how to travel in Germany.
a presentation for foreigners about how to travel in Germany.a presentation for foreigners about how to travel in Germany.
a presentation for foreigners about how to travel in Germany.
 
Italia Lucca 1 Un tesoro nascosto tra le sue mura
Italia Lucca 1 Un tesoro nascosto tra le sue muraItalia Lucca 1 Un tesoro nascosto tra le sue mura
Italia Lucca 1 Un tesoro nascosto tra le sue mura
 
Revolutionalizing Travel: A VacAI Update
Revolutionalizing Travel: A VacAI UpdateRevolutionalizing Travel: A VacAI Update
Revolutionalizing Travel: A VacAI Update
 
Enjoy ➥8448380779▻ Call Girls In Sector 62 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 62 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 62 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 62 Noida Escorts Delhi NCR
 
Moroccan Architecture presentation ( Omar & Yasine ).pptx
Moroccan Architecture presentation ( Omar & Yasine ).pptxMoroccan Architecture presentation ( Omar & Yasine ).pptx
Moroccan Architecture presentation ( Omar & Yasine ).pptx
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
 
Authentic Travel Experience 2024 Greg DeShields.pptx
Authentic Travel Experience 2024 Greg DeShields.pptxAuthentic Travel Experience 2024 Greg DeShields.pptx
Authentic Travel Experience 2024 Greg DeShields.pptx
 
Where to Stay in Lagos, Portugal.pptxasd
Where to Stay in Lagos, Portugal.pptxasdWhere to Stay in Lagos, Portugal.pptxasd
Where to Stay in Lagos, Portugal.pptxasd
 
Enjoy ➥8448380779▻ Call Girls In Sector 74 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 74 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 74 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 74 Noida Escorts Delhi NCR
 
Haitian culture and stuff and places and food and travel.pptx
Haitian culture and stuff and places and food and travel.pptxHaitian culture and stuff and places and food and travel.pptx
Haitian culture and stuff and places and food and travel.pptx
 
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)
69 Girls ✠ 9599264170 ✠ Call Girls In East Of Kailash (VIP)
 
How Safe Is It To Witness Whales In Maui’s Waters
How Safe Is It To Witness Whales In Maui’s WatersHow Safe Is It To Witness Whales In Maui’s Waters
How Safe Is It To Witness Whales In Maui’s Waters
 
Inspirational Quotes About Italy and Food
Inspirational Quotes About Italy and FoodInspirational Quotes About Italy and Food
Inspirational Quotes About Italy and Food
 

M2M, IoT and Security: a Market Overview

  • 1. M2M and IoT Markets Godfrey Chua, Principal Analyst Machina Research Security of Things Forum Cambridge, MA September 2015
  • 2. M2M connections will grow from 5 billion in 2014 to 27 billion in 2024 • Machina Research defines M2M as “Connections to remote sensing, monitoring and actuating devices, together with associated aggregation devices” • Based on this definition there were 5 billion M2M connections in 2014 and there will be 27 billion in 2024, a CAGR of 18% Machina Research 2 Global machine-to-machine connections 2014-24 Source: Machina Research 2015 Note: in this edition our Global M2M report, as in the previous editions, we have included in-building network infrastructure within our definition of M2M. As such, devices such as residential modems/ routers are included.
  • 3. Short-range technologies will dominate M2M • Over two-thirds of connections in 2024 will be short range (e.g. in-building PLC, WiFi, Zigbee, Z-Wave) • 14% of connections in 2024 will be LPWA, driven by the simplicity of deployment Machina Research 3 Global M2M connections 2014-2024 by technology Source: Machina Research 2015
  • 4. Wide area M2M connections will be dominated by LPWA technologies • By 2024, almost half of wide area M2M connections will be supported by LPWA technologies • LPWA technologies are attractive due to: o ease of deployment o homogeneity of solution o low price and long battery life • Cellular connections account for almost one-third because as well as the first two benefits they also deliver high capacity and mobility Machina Research 4 Wide area M2M connections by technology, 2014-24 Source: Machina Research 2015
  • 5. M2M accounted for 4% of cellular connections in 2014, rising to 18% in 2024 • At the end of 2014 there were over 250 million cellular M2M connections • By 2024 M2M’s share of cellular connections will have increased to nearly 1 in 5 • M2M accounts for nearly half of the growth in cellular connections from 2014-24 Machina Research 5 Machine-to-machine’s share of cellular connected devices, 2014-2024 Source: Machina Research 2015 0% 2% 4% 6% 8% 10% 12% 14% 16% 18% 20% - 3 6 9 12 15 Handset/Tablet PC/Laptop M2M % M2M
  • 6. Connected Car will account for 52% of cellular connections in 2024 • The top application groups for cellular connections will be: o Connected Car o Connected Living and Working • The Connected Car is top because it needs features only cellular can provide: o Comprehensive coverage o High-speed mobility o High bandwidth Machina Research 6 Machine-to-machine cellular connections by biggest applications, 2024 Source: Machina Research 2015
  • 7. M2M and IoT solutions are complex and made up of several components Devices Networks Platforms Internet of Things Connected things, products, systems, applications, etc. Security Storage ApplicationsData Processing Machina Research 7
  • 8. M2M and IoT SECURITY must encompass all components Devices Networks Platforms Internet of Things Connected things, products, systems, applications, etc. Security Storage ApplicationsData Processing Machina Research 8
  • 9. Security is a top of mind concern Machina Research 9 Source: Xively and Machina Research Survey 2015
  • 10. Some key elements in security • Data security and privacy • Lightweight device controllers • Firmware security updates • Pervasiveness • Passwords (and the human element) Machina Research 10
  • 11. Key considerations in security • Must be built into the business case o Align security efforts with business value • Partner collaboration is essential o Overall solution security is only as strong as the weakest link • Contingency planning o Is 100% security truly possible? Machina Research 11
  • 12. Machina Research 12 Thank you! Godfrey Chua Email: godfrey.chua@machinaresearch.com Twitter: gsc_IoT