Gartner Research

Market Trends: Security Platforms for Connected Home Devices

Published: 16 May 2016

ID: G00297232

Analyst(s): Mark Hung, Werner Goertz


Malicious intrusion is a critical factor in the success of connected home products. Product leaders should follow three stages of security implementation for their devices — selecting the optimal hardware security layer, appropriate standards and ecosystem — driven by constraints and use value.

Table Of Contents


Market Trend

  • Personal Technologies Are Disrupting Existing Home Security and Home Surveillance Markets
  • Market Structure Trend
    • Today's Security Platforms Are Fragmented and Noninteroperable
    • Nascent Markets Create Buggy and Risky Products
  • Buyer Trend
    • Home Security and Home Surveillance Have Top Priority for Connected Home Buyers
  • Technology Trend
    • Devices in the Connected Home Form a Hierarchy of Networked Elements
    • Embedded Processor IP Offers Processor Virtualization
    • Semiconductor Components and Vendors Deliver Security Chipsets
    • Network Security Must Be Implemented Carefully and With Full Compliance
    • Emerging Vendor Ecosystems Will Standardize Interoperability and Security

Contrarian View

  • Most Connected Home Devices Require No Security Protocols Due to the Nature of the Threat and Severity of Attack

Vendors to Watch

  • ARM
  • Arrayent

Gartner Recommended Reading

©2021 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.

Already have a Gartner Account?

Purchase this Document

To purchase this document, you will need to register or sign in above

Become a client

Learn how to access this content as a Gartner client.