ENP Newswire -
Release date- 07102013 -
Worldwide shipments of cybersecurity MCUs-also known as embedded secure MCUs-will rise to 529 million units in 2017, according to a new report entitled 'Embedded Digital Security-World-2013' from the Smart Cards and Digital Security group at
The attached figure presents the IHS forecast of global shipments of cybersecurity MCUs in all applications excluding smartcards.
Cybersecurity MCUs protect data in devices and communications and ensure that devices are operating in a trusted or expected manner. Features of cybersecurity MCUs include cryptography acceleration, secure-key storage and management and secure boot of computing systems. These MCUs are used in a wide variety of products and electronic devices, from PCs and servers, to electronic peripheral devices and medical consumables, to a broad range of systems that engage in M2M communications.
'Cybersecurity MCUs are playing a key role in defending a world that is increasingly at risk from hackers, cyberattacks, and counterfeit products,' said
There are three applications for cybersecurity MCUs: trusted platform modules (TPM), authentication and M2M.
A matter of trust
The TPM market represents the application of security technologies to the PC and server markets in a standardized fashion.
Until recently, TPM functionality has mostly been implemented on enterprise PCs and servers. This is now starting to change, as TPMs are also being used in the consumer-oriented Google Chromebook laptop and in certain tablet PCs, such as the Fujitsu STYLISTIC Q572.
Nevertheless, IHS anticipates that through 2017 TPMs will mostly find use in enterprise computing applications. This is because of the complexity associated with activating and configuring a TPM, which is too technically challenging for most consumers. Another inhibiting factor is the great diversity of security needs of enterprises, spanning both financial loss assessments and regulatory mandates.
To thine own self be true
A wide diversity of end products could potentially make use of cybersecurity MCUs for authentication purposes, including brand protection, revenue assurance, and product safety and reliability. IHS has identified three major clusters of product types that use secure MCUs as authentication co-processors: electronic peripheral devices, luxury goods and medical consumables.
But there are many other applications that could employ authentication technology. For example, during the research for this report, IHS came across the need for secure MCUs to be used in casino gaming devices to comply with gaming regulations.
The M2M market represents a communications model that uses various network connectivity technologies-including cellular-to integrate sensors, devices and machines into applications that automate monitoring and control functionality, or that enable transparent content delivery.
The market opportunity for secure MCUs is in two areas. First, secure MCUs can be integrated directly onto the motherboard of the host device, or the host device can use an application processor that has embedded a firmware-based secure MCU. Second, the device can embed an M2M form factor) SIM card into a cellular module. The directly embedded market opportunity for secure MCUs in M2M is by far the smaller of the two areas mentioned above at the present time.
The M2M area represents the fastest-growing segment of the cybersecurity MCU market, with 20 million units set to ship in 2017, up from 2.7 million units in 2013.
However, if secure MCUs were to become recognized as an essential underpinning of the Internet of Things, growth could be much higher. That is, if secure MCUs are deployed into most Internet-connected devices and become a cornerstone of enabling cybersecurity, the market opportunity for directly-embedded secure MCUs would expand into the billions of units.
About IHS (www.ihs.com)
IHS (NYSE: IHS) is the leading source of information, insight and analytics in critical areas that shape today's business landscape. Businesses and governments in more than 165 countries around the globe rely on the comprehensive content, expert independent analysis and flexible delivery methods of IHS to make high-impact decisions and develop strategies with speed and confidence. IHS has been in business since 1959 and became a publicly traded company on the
IHS is a registered trademark of
[Editorial queries for this story should be sent to email@example.com]
((Comments on this story may be sent to firstname.lastname@example.org))
Most Popular Stories
- Bipartisan Budget Deal Gets Key Support in House
- Bitcoin Clones Lurch Onto Financial Scene
- Clinton to Keynote Annual Simmons Leadership Conference
- GM to Stop Making Autos in Australia
- Selena Gomez, Shakira Among Top Hispanic Searches
- PhD Project Grooms Business Profs
- How Bitcoin and Other Cryptocurrencies Work
- How to Survive a Subzero Stranding
- It's Primary Time in Texas
- Pacific Trade Pact Delay Hinders U.S. Pivot to Asia