Global shipments of cybersecurity microcontrollers to rise 91 percent by 2017

Cybersecurity microcontroller (MCU) global shipments are expected to almost double to 529 million units by 2017 because of increased demand for computer security and authentication tools.

11/21/2013


Driven by demand for increased security in computers, authentication, and the machine-to-machine (M2M) market, global shipments of cybersecurity microcontrollers (MCUs) are set to nearly double by 2017.

Worldwide shipments of cybersecurity MCUs—also known as embedded secure MCUs—will rise to 529 million units in 2017, according to a new report entitled “Embedded Digital Security—World—2013” from the Smart Cards and Digital Security group at IHS Inc. (NYSE: IHS). This represents 92 percent growth from 276 million in 2013.

The attached figure presents the IHS forecast of global shipments of cybersecurity MCUs in all applications excluding smartcards.

Cybersecurity MCUs protect data in devices and communications and ensure that devices are operating in a trusted or expected manner. Features of cybersecurity MCUs include cryptography acceleration, secure-key storage and management and secure boot of computing systems. These MCUs are used in a wide variety of products and electronic devices, from PCs and servers, to electronic peripheral devices and medical consumables, to a broad range of systems that engage in M2M communications.

Driven by demand for increased security in computers, authentication and the machine-to-machine (M2M) market, global shipments of cybersecurity microcontrollers (MCUs) are set to nearly double by 2017. Courtesy: IHS Inc.

“Cybersecurity MCUs are playing a key role in defending a world that is increasingly at risk from hackers, cyberattacks, and counterfeit products,” said Sam Lucero, senior principal analyst covering M2M & the Internet of Things for IHS. “Because they are the principal hardware element enabling security in a diverse range of applications, cybersecurity MCUs will see widespread usage and fast growth in the coming years.”

There are three applications for cybersecurity MCUs: trusted platform modules (TPM), authentication and M2M.

A matter of trust

The TPM market represents the application of security technologies to the PC and server markets in a standardized fashion.

Until recently, TPM functionality has mostly been implemented on enterprise PCs and servers. This is now starting to change, as TPMs are also being used in the consumer-oriented Google Chromebook laptop and in certain tablet PCs, such as the Fujitsu Stylistic Q572.

Nevertheless, IHS anticipates that through 2017 TPMs will mostly find use in enterprise computing applications. This is because of the complexity associated with activating and configuring a TPM, which is too technically challenging for most consumers. Another inhibiting factor is the great diversity of security needs of enterprises, spanning both financial loss assessments and regulatory mandates.

To thine own self be true

A wide diversity of end products could potentially make use of cybersecurity MCUs for authentication purposes, including brand protection, revenue assurance, and product safety and reliability. IHS has identified three major clusters of product types that use secure MCUs as authentication co-processors: electronic peripheral devices, luxury goods and medical consumables.

But there are many other applications that could employ authentication technology. For example, during the research for this report, IHS came across the need for secure MCUs to be used in casino gaming devices to comply with gaming regulations.

M2M mania

The M2M market represents a communications model that uses various network connectivity technologies—including cellular—to integrate sensors, devices and machines into applications that automate monitoring and control functionality, or that enable transparent content delivery.

The market opportunity for secure MCUs is in two areas. First, secure MCUs can be integrated directly onto the motherboard of the host device, or the host device can use an application processor that has embedded a firmware-based secure MCU. Second, the device can embed an M2M form factor) SIM card into a cellular module. The directly embedded market opportunity for secure MCUs in M2M is by far the smaller of the two areas mentioned above at the present time.

The M2M area represents the fastest-growing segment of the cybersecurity MCU market, with 20 million units set to ship in 2017, up from 2.7 million units in 2013.

However, if secure MCUs were to become recognized as an essential underpinning of the Internet of Things, growth could be much higher. That is, if secure MCUs are deployed into most Internet-connected devices and become a cornerstone of enabling cybersecurity, the market opportunity for directly-embedded secure MCUs would expand into the billions of units.

- Edited by CFE Media. See more security-related research.



No comments
The Top Plant program honors outstanding manufacturing facilities in North America. View the 2015 Top Plant.
The Product of the Year program recognizes products newly released in the manufacturing industries.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
Your leaks start here: Take a disciplined approach with your hydraulic system; U.S. presence at Hannover Messe a rousing success
Hannover Messe 2016: Taking hold of the future - Partner Country status spotlights U.S. manufacturing; Honoring manufacturing excellence: The 2015 Product of the Year Winners
Inside IIoT: How technology, strategy can improve your operation; Dry media or web scrubber?; Six steps to design a PM program
Getting to the bottom of subsea repairs: Older pipelines need more attention, and operators need a repair strategy; OTC preview; Offshore production difficult - and crucial
Digital oilfields: Integrated HMI/SCADA systems enable smarter data acquisition; Real-world impact of simulation; Electric actuator technology prospers in production fields
Special report: U.S. natural gas; LNG transport technologies evolve to meet market demand; Understanding new methane regulations; Predictive maintenance for gas pipeline compressors
Warehouse winter comfort: The HTHV solution; Cooling with natural gas; Plastics industry booming
Managing automation upgrades, retrofits; Making technical, business sense; Ensuring network cyber security
Designing generator systems; Using online commissioning tools; Selective coordination best practices

Annual Salary Survey

Before the calendar turned, 2016 already had the makings of a pivotal year for manufacturing, and for the world.

There were the big events for the year, including the United States as Partner Country at Hannover Messe in April and the 2016 International Manufacturing Technology Show in Chicago in September. There's also the matter of the U.S. presidential elections in November, which promise to shape policy in manufacturing for years to come.

But the year started with global economic turmoil, as a slowdown in Chinese manufacturing triggered a worldwide stock hiccup that sent values plummeting. The continued plunge in world oil prices has resulted in a slowdown in exploration and, by extension, the manufacture of exploration equipment.

Read more: 2015 Salary Survey

Maintenance and reliability tips and best practices from the maintenance and reliability coaches at Allied Reliability Group.
The One Voice for Manufacturing blog reports on federal public policy issues impacting the manufacturing sector. One Voice is a joint effort by the National Tooling and Machining...
The Society for Maintenance and Reliability Professionals an organization devoted...
Join this ongoing discussion of machine guarding topics, including solutions assessments, regulatory compliance, gap analysis...
IMS Research, recently acquired by IHS Inc., is a leading independent supplier of market research and consultancy to the global electronics industry.
Maintenance is not optional in manufacturing. It’s a profit center, driving productivity and uptime while reducing overall repair costs.
The Lachance on CMMS blog is about current maintenance topics. Blogger Paul Lachance is president and chief technology officer for Smartware Group.
This article collection contains several articles on the vital role that compressed air plays in manufacturing plants.
This article collection contains several articles on the Industrial Internet of Things (IIoT) and how it is transforming manufacturing.
This article collection contains several articles on strategic maintenance and understanding all the parts of your plant.
click me