Skip to Content
  • Offices

    Offices

    North & Latin America
    • Atlanta
    • Austin
    • Bogota
    • Boston
    • Buenos Aires
    • Chicago
    • Dallas
    • Denver
    • Houston
    • Los Angeles
    • Mexico City
    • Minneapolis
    • Monterrey
    • Montreal
    • New York
    • Rio de Janeiro
    • San Francisco
    • Santiago
    • São Paulo
    • Seattle
    • Silicon Valley
    • Toronto
    • Washington, DC
    Europe & Africa
    • Amsterdam
    • Athens
    • Berlin
    • Brussels
    • Copenhagen
    • Dusseldorf
    • Frankfurt
    • Helsinki
    • Istanbul
    • Johannesburg
    • Kyiv
    • Lisbon
    • London
    • Madrid
    • Milan
    • Munich
    • Oslo
    • Paris
    • Rome
    • Stockholm
    • Vienna
    • Warsaw
    • Zurich
    Middle East
    • Doha
    • Dubai
    • Riyadh
    Asia & Australia
    • Bangkok
    • Beijing
    • Bengaluru
    • Brisbane
    • Ho Chi Minh City
    • Hong Kong
    • Jakarta
    • Kuala Lumpur
    • Manila
    • Melbourne
    • Mumbai
    • New Delhi
    • Perth
    • Seoul
    • Shanghai
    • Singapore
    • Sydney
    • Tokyo
    See all offices
  • Alumni
  • Media Center
  • Subscribe
  • Contact
  • Chile | Español

    Select your region and language

    Global
    • Global (English)
    North & Latin America
    • Brazil (Português)
    • Argentina (Español)
    • Canada (Français)
    • Chile (Español)
    • Colombia (Español)
    Europe, Middle East, & Africa
    • France (Français)
    • DACH Region (Deutsch)
    • Italy (Italiano)
    • Spain (Español)
    • Greece (Elliniká)
    Asia & Australia
    • China (中文版)
    • Korea (한국어)
    • Japan (日本語)
  • Saved items (0)
    Saved items (0)

    You have no saved items.

    Bookmark content that interests you and it will be saved here for you to read or share later.

    Explore Bain Insights
  • Industries
    Main menu

    Industries

    • Aeroespacial y Defensa
    • Agroindustria
    • Químicos
    • Construcción e Infraestructura
    • Productos de Consumo
    • Servicios Financieros
    • Salud y Ciencias de la Vida
    • Maquinaria y Equipo Industrial
    • Medios y Entretenimiento
      Industries
      Medios y Entretenimiento
      • Media Lab
    • Metales
    • Minería
    • Petróleo y Gas
    • Papel y Empaque
    • Private Equity
      Industries
      Private Equity
      • Due Diligence
      • Exit Planning
      • Firm Strategy & Operations
      • Portfolio Value Creation
    • Sector Público y Social
    • Retail
    • Tecnología
    • Telecomunicaciones
      Industries
      Telecomunicaciones
      • Capital Expenditure
      • Telco Digital Transformation
    • Transporte
    • Viajes y Turismo
    • Servicios Públicos y Energías Renovables
  • Consulting Services
    Main menu

    Consulting Services

    • Customer Experience
    • Sustainability
    • Innovation
    • M&A
    • Operations
    • People & Organization
    • Private Equity
    • Sales & Marketing
    • Strategy
    • AI, Insights, and Solutions
    • Technology
    • Transformation
  • Digital
  • Insights
    Main menu

    Insights

    • Industry Insights
    • Services Insights
    • Bain Books
    • Webinars
    • Bain Futures
    View all Insights
    Featured topics
    • Tariff Response
    • Artificial Intelligence
    • Thriving in Uncertainty
    • Executive Conversations
    • Macro Trends
    • M&A Report
    • Healthcare Private Equity Report
    • Paper & Packaging Report
    • Technology Report
    • CEO's Guide to Sustainability
    • CEO Insights
    • CFO Insights
    • COO Insights
    • CIO Insights
    • CMO Insights
    View all featured topics
  • About
    Main menu

    About

    • What We Do
    • What We Believe
    • Our People & Leadership
    • Client Results
    • Awards & Recognition
    • Global Affiliations
    Further: Our global responsibility
    • Sustainability
    • Social Impact
    • World Economic Forum
    Learn more about Further
  • Carreras
    Main menu

    Carreras

    • Trabaja con Nosotros
      Carreras
      Trabaja con Nosotros
      • Find Your Place
      • Nuestras Áreas de Trabajo
      • Equipos Integrados
      • Estudiantes
      • Internships & Programs
      • Eventos de Reclutamiento
    • La Vida en Bain
      Carreras
      La Vida en Bain
      • Historias Profesionales
      • Nuestra Gente
      • Dónde Trabajamos
      • Apoyando tu Crecimiento
      • Grupos de Afinidad
      • Beneficios
    • Impact Stories
    • Nuestro Proceso
      Carreras
      Nuestro Proceso
      • Qué Esperar
      • Entrevistas
    FIND JOBS
  • Offices
    Main menu

    Offices

    • North & Latin America
      Offices
      North & Latin America
      • Atlanta
      • Austin
      • Bogota
      • Boston
      • Buenos Aires
      • Chicago
      • Dallas
      • Denver
      • Houston
      • Los Angeles
      • Mexico City
      • Minneapolis
      • Monterrey
      • Montreal
      • New York
      • Rio de Janeiro
      • San Francisco
      • Santiago
      • São Paulo
      • Seattle
      • Silicon Valley
      • Toronto
      • Washington, DC
    • Europe & Africa
      Offices
      Europe & Africa
      • Amsterdam
      • Athens
      • Berlin
      • Brussels
      • Copenhagen
      • Dusseldorf
      • Frankfurt
      • Helsinki
      • Istanbul
      • Johannesburg
      • Kyiv
      • Lisbon
      • London
      • Madrid
      • Milan
      • Munich
      • Oslo
      • Paris
      • Rome
      • Stockholm
      • Vienna
      • Warsaw
      • Zurich
    • Middle East
      Offices
      Middle East
      • Doha
      • Dubai
      • Riyadh
    • Asia & Australia
      Offices
      Asia & Australia
      • Bangkok
      • Beijing
      • Bengaluru
      • Brisbane
      • Ho Chi Minh City
      • Hong Kong
      • Jakarta
      • Kuala Lumpur
      • Manila
      • Melbourne
      • Mumbai
      • New Delhi
      • Perth
      • Seoul
      • Shanghai
      • Singapore
      • Sydney
      • Tokyo
    See all offices
  • Alumni
  • Media Center
  • Subscribe
  • Contact
  • Chile | Español
    Main menu

    Select your region and language

    • Global
      Select your region and language
      Global
      • Global (English)
    • North & Latin America
      Select your region and language
      North & Latin America
      • Brazil (Português)
      • Argentina (Español)
      • Canada (Français)
      • Chile (Español)
      • Colombia (Español)
    • Europe, Middle East, & Africa
      Select your region and language
      Europe, Middle East, & Africa
      • France (Français)
      • DACH Region (Deutsch)
      • Italy (Italiano)
      • Spain (Español)
      • Greece (Elliniká)
    • Asia & Australia
      Select your region and language
      Asia & Australia
      • China (中文版)
      • Korea (한국어)
      • Japan (日本語)
  • Saved items  (0)
    Main menu
    Saved items (0)

    You have no saved items.

    Bookmark content that interests you and it will be saved here for you to read or share later.

    Explore Bain Insights
  • Industries
    • Industries

      • Aeroespacial y Defensa
      • Agroindustria
      • Químicos
      • Construcción e Infraestructura
      • Productos de Consumo
      • Servicios Financieros
      • Salud y Ciencias de la Vida
      • Maquinaria y Equipo Industrial
      • Medios y Entretenimiento
      • Metales
      • Minería
      • Petróleo y Gas
      • Papel y Empaque
      • Private Equity
      • Sector Público y Social
      • Retail
      • Tecnología
      • Telecomunicaciones
      • Transporte
      • Viajes y Turismo
      • Servicios Públicos y Energías Renovables
  • Consulting Services
    • Consulting Services

      • Customer Experience
      • Sustainability
      • Innovation
      • M&A
      • Operations
      • People & Organization
      • Private Equity
      • Sales & Marketing
      • Strategy
      • AI, Insights, and Solutions
      • Technology
      • Transformation
  • Digital
  • Insights
    • Insights

      • Industry Insights
      • Services Insights
      • Bain Books
      • Webinars
      • Bain Futures
      View all Insights
      Featured topics
      • Tariff Response
      • Artificial Intelligence
      • Thriving in Uncertainty
      • Executive Conversations
      • Macro Trends
      • M&A Report
      • Healthcare Private Equity Report
      • Paper & Packaging Report
      • Technology Report
      • CEO's Guide to Sustainability
      • CEO Insights
      • CFO Insights
      • COO Insights
      • CIO Insights
      • CMO Insights
      View all featured topics
  • About
    • About

      • What We Do
      • What We Believe
      • Our People & Leadership
      • Client Results
      • Awards & Recognition
      • Global Affiliations
      Further: Our global responsibility
      • Sustainability
      • Social Impact
      • World Economic Forum
      Learn more about Further
  • Carreras
    Popular Searches
    • Agile
    • Digital
    • Strategy
    Your Previous Searches
      Recently Visited Pages

      Content added to saved items

      Saved items (0)

      Removed from saved items

      Saved items (0)

      Brief

      Cybersecurity Is the Key to Unlocking Demand in the Internet of Things

      Cybersecurity Is the Key to Unlocking Demand in the Internet of Things

      Enterprise customers would buy more IoT devices if vendors could ensure better security.

      By Syed Ali, Ann Bosche and Frank Ford

      • min read
      }

      Brief

      Cybersecurity Is the Key to Unlocking Demand in the Internet of Things
      en
      Executive Summary
      • Enterprise customers are limiting their investment in IoT devices because they have concerns about security risks.
      • Executives say they would buy more devices and pay more for them if manufacturers could provide better security.
      • Investing to improve security could grow the IoT cybersecurity market by $9 billion to $11 billion.

      The Internet of Things continues to grow rapidly, but concerns about security remain a significant barrier and are hindering the adoption of IoT devices (see Figure 1).

      In fact, research by Bain & Company finds that enterprise customers would be willing to buy more IoT devices if their concerns about cybersecurity risks were addressed—on average, at least 70% more than what they might buy if their concerns remain unresolved (see Figure 2). In addition, 93% of the executives we surveyed said they would pay an average of 22% more for devices with better security. Taken together, Bain estimates that improving security solutions for these devices could grow the IoT cybersecurity market by $9 billion to $11 billion. One reason for this willingness may be increased pressure from new regulations such as the EU General Data Protection Regulation, which imposes strict data protection requirements and penalties on companies for security failures, including data breaches.


      IoT-Cybersecurity-fig01_embed

      IoT-Cybersecurity-fig02_embed

      These are among the findings of our research and survey work over three years, including discussions with CEOs, COOs, CIOs, CISOs and other business and technical leaders on cybersecurity and IoT technology. 1 Significantly, executives from companies with the most advanced cybersecurity capabilities are also the most concerned about security risks.

      For IoT device vendors—companies that make IoT devices as well as those that provide related solutions—the message is clear: Improve security to gain a competitive edge and grow your market.

      How customers think about cybersecurity

      Most executives we surveyed (60%) said they were very concerned about the risks IoT devices pose to their companies—not surprising, given the damages that an IoT security breach can cause to operations, revenue and safety. When poorly protected, IoT devices can allow access to enterprise systems, resulting in large data breaches.

      Infected devices can also be commandeered to launch debilitating attacks against enterprises. In October 2016, the Mirai malware attack compromised thousands of sensors, cameras and other devices to create a massive botnet that launched distributed denial-of-service attacks that disrupted popular sites, including GitHub, Netflix, Twitter and Airbnb. In January 2018, a Mirai variant called Okiru targeted popular versions of ARC processors embedded in billions of IoT products. Hijacked IoT devices can also carry out click fraud, which costs advertisers billions of dollars annually. Compromised devices can also be used to mine cryptocurrency such as bitcoin and monero.

      Infographic

      Improving Security in the Internet of Things

      The Internet of Things could be growing even faster with better cybersecurity.

      In determining solutions to guard against these types of attacks, IoT device vendors can segment their target customers by levels of cybersecurity capability maturity. Such a segmentation is helpful in determining distinct approaches based on typical needs, and reflects the reality that enterprise customers' capabilities are not static but rather are progressing toward more advanced levels (see Figure 3). Our research finds that customers at the least advanced end of the spectrum are more likely to seek out simplified and integrated security solutions, whereas those with more advanced capabilities prefer to invest in best-of-breed or customized point solutions.

      Across segments, nearly all executives said that IoT devices pose a moderate or significant risk to their organizations, and executives at companies with greater cybersecurity sophistication see more risk than those at companies with less sophisticated cybersecurity capabilities (see Figure 4).


      IoT-Cybersecurity-fig03_embed

      IoT-Cybersecurity-fig04_embed

      Our research also indicates that executives within some industries see themselves at greater risk than others (see Figure 5). Executives in durable goods, building and construction, energy and utilities, financial services, and technology were most likely to express a significant level of concern. These concerns reflect industry realities, not merely the perceptions of individual executives. In energy, for example, oil and gas producers rely on tens of thousands of IoT sensors and complex production control devices at their wells and drilling platforms. Energy companies use the data from these IoT devices, which can exceed a terabyte on an average day, in near real time to fine-tune their operations while maintaining strict safety thresholds. Compromising the integrity or disrupting the flow of this data could lead to catastrophic damage.


      IoT-Cybersecurity-fig05_embed

      Nearly half of healthcare executives see a significant risk. Hospitals and clinics increasingly rely on connected diagnostic monitoring and care delivery equipment from a range of vendors that source components from third parties. MRIs, robotics-assisted surgery devices and drug delivery pumps all present tempting opportunities for unauthorized access—a clear threat to patient safety. In September 2017, the US Industrial Control Systems Cyber Emergency Response Team identified vulnerabilities in wireless syringe infusion pumps, warning that, if unmitigated, these could pose a significant threat to patients.

      Manufacturers' use of IoT also introduces new risks in industrial environments. Large manufacturers might deploy thousands of IoT devices, ranging from sensors to sophisticated, semiautonomous robots. Compromised sensors could lead to data inaccuracies that hinder management's ability to make critical operational decisions or create inventory problems that wreak havoc across the value chain. Still greater risks may be found on the plant floor, where a compromised robotic device could introduce subtle but dangerous activity or create greater havoc and harm to workers and other equipment.

      How customers manage IoT cybersecurity


      Our conversations with executives who manage security indicate that customers want solutions that are highly effective, easy to integrate and flexible to deploy. Companies take a range of approaches to meet their security needs based on their capabilities and the availability of marketplace solutions from vendors (see Figure 6). Only about a third of IoT cybersecurity solutions used today are from IoT device vendors, indicating that vendors are either not offering holistic, high-quality solutions that meet consumer needs or they are not promoting them well enough. Our research found that companies with the most advanced cybersecurity capabilities rely more on internally developed security solutions not only because they may have more complex needs but also because they are more likely to have the talent and capabilities to develop their own solutions. Companies with ad hoc security capabilities have the most gaps across all IoT layers that we tested.


      IoT-Cybersecurity-fig06_embed

      A disconnect on customer needs


      We also looked at how companies deploy solutions by layer of security, and found ample opportunity for IoT device vendors at every layer of the stack.

      Our survey found that the access interface layer has the greatest level of protection, whether internally developed or provided by a manufacturer or third party (see Figure 7). Other layers of the stack were protected by more internal solutions—or, in some cases, none at all. Customers' preference for internal solutions may be partially explained by considering the specific conditions of each layer.


      IoT-Cybersecurity-fig07_embed

      For example, data security solutions typically require more computing and power resources than are currently available on basic IoT devices. MIT researchers have created a new chip that enables encryption on IoT devices using 1/400 of the power and 1/10 of the memory at 500 times the speed of current chips. But until this new technology is widely adopted, manufacturers need to continue to make design and capability trade-offs when balancing these requirements against the size, cost and power of the IoT device.

      Hardware security solutions must address vulnerabilities at the physical interface (such as USB or Ethernet ports), the device operating system and firmware. But few manufacturers adequately test hardware against known vulnerabilities before shipping, and far more devices fall short during ongoing tests for new vulnerabilities.

      Finally, IT security operations must manage and monitor their IoT devices, partly with log data from the other five layers. While most enterprises would like a cohesive set of tools and a unified overview of the security posture of their devices, few IoT device makers understand their customers' operations well enough to provide that kind of solution. Still, they can work with customers to identify trusted third parties to act as partners in developing comprehensive security solutions.

      Taken in aggregate, these types of manufacturer shortcomings can leave customers on their own when it comes to securing their IoT devices across these layers. Lacking well-designed IoT cybersecurity products and services, customers are devising their own solutions, forgoing them altogether or failing to implement IoT solutions until vendors can fill the gap.

      What IoT device vendors can do to gain market share


      IoT device vendors and ecosystem players that move quickly to improve the security around IoT devices are likely to reap rewards not only from their ability to earn a premium but also from an expanded market. Some leaders in the IoT ecosystem are stepping up to meet the security challenge and grab the related opportunities. Amazon has created an ecosystem of IoT solutions integrated with its cloud offering. It recently licensed an open source operating system called FreeRTOS that makes it easier to develop, deploy, manage and secure low-power IoT devices, and enhanced it with libraries and tools that help with IoT device management as well as data and network security. Similarly, Microsoft's Azure IoT Hub provides device management and security capabilities in the form of device provisioning, authentication and secure connection. Another example is GE, an industrial IoT device manufacturer that views cybersecurity as a competitive advantage and strategically strives to embed capabilities across all layers of its IoT technology stack. GE acquired Wurldtech in 2014 and eventually integrated the Achilles security products with its Predix IoT management platform. From a governance perspective, GE assigns risk management and product security responsibilities to dedicated leaders across its organization who ensure that cybersecurity is prioritized and implemented into its products, including IoT devices.

      These efforts represent important progress, but on their own are not enough to address the broader security issues facing IoT adoption. All IoT device vendors will need to pay more attention to security in the design, development and deployment of devices. Four steps can help executives frame their task.

      First, manufacturers need to understand how customers are using their devices. Staying current by refreshing their understanding of customer use cases every 12 to 18 months will allow them to stay on top of evolving security requirements and help identify unmet needs. Ascertaining the average cybersecurity maturity level of their customers will help manufacturers invest in the appropriate out-of-the-box and add-on solutions. For example, ad hoc maturity customers tend to seek value instead of the latest and greatest solutions.

      Second, manufacturers should provide cybersecurity capabilities on the device and, when possible, partner with trusted cybersecurity vendors to provide additional solutions. Engineering teams should embed secure development practices into the software and hardware components of the device, and provide inherent solutions for the access interface, apps, data and device layers. Most customers will use these out-of-the-box capabilities regardless of their cybersecurity maturity. Taking these measures can mitigate common vulnerabilities in IoT devices such as default or embedded passwords, lack of data security for credentials and network communications, and weak safeguards for ensuring system integrity. Manufacturers can also invest in partnerships with cybersecurity vendors to provide aftermarket solutions at the data, network and operations layers, selectively integrating these for some customer segments. For example, customers with consistent security tend to prefer integrated solutions, while best practice buyers look for best-of-breed solutions rather than integration among solutions.

      Third, manufacturers also need to meet quality assurance thresholds and be able to certify that their IoT devices are free from known vulnerabilities. This would mitigate a major pain point for customers who sometimes install new devices without realizing they contain vulnerabilities. Deploying a more methodical process to identify and remove vulnerabilities across layers or engaging third-party vulnerability scanning and penetration test firms can help manufacturers meet this bar. Defining a cybersecurity warranty period with clear obligations tells customers what the vendor is responsible for, and for how long. In combination, these measures deliver a hardened device aligned with many cybersecurity best practices.

      Finally, manufacturers can fulfill their obligations during the warranty period by continuously testing for new vulnerabilities, providing software and firmware updates, as well as feature and functionality upgrades for out-of-the-box and aftermarket solutions. Delivering updates to firmware, operating systems and applications in response to newly discovered security vulnerabilities should remain a top priority throughout the warranty period.

      These four steps are a start, though by no means the whole of what it will take to begin to address the security concerns that hold back the Internet of Things. While growth in IoT markets seems destined to continue its inexorable march, many enterprise customers will continue to move cautiously until they can gain some reasonable assurance of the security not only of their data but also of the operations that increasingly rely on devices, sensors and the Internet of Things.

      For more on Bain’s viewpoint on IoT, see “Defining the Battlegrounds of the Internet of Things.”


      1 Bain's 2017 IoT enterprise cybersecurity research drew more than 280 responses from companies with a wide variance in cybersecurity maturity in Canada, Europe and the US, ranging in revenue size from $100 million to $10 billion and headcount from 200 to more than 10,000 employees. Our 2018 IoT enterprise customer research drew more than 520 responses from companies in Canada, Europe, China and the US, ranging from $10 million to more than $10 billion in revenue size and headcount from 100 to more than 10,000 employees. Two Bain surveys in 2016 measured customer opinions (n=533) and vendors' views (n=158).

      Syed Ali is an expert vice president with Bain & Company in the Houston office. Ann Bosche is a partner with Bain in San Francisco, and Frank Ford is a Bain partner in London. Syed and Frank are experts in cybersecurity and partners in the Global Information Technology practice, and Ann works with Bain's Global Technology practice.

      The authors would like to thank Lauren Brom for her contributions to this work.


      IoT-Cybersecurity-fig01_full

      IoT-Cybersecurity-fig02_full

      IoT-Cybersecurity-fig03_full

      IoT-Cybersecurity-fig04_full

      IoT-Cybersecurity-fig05_full

      IoT-Cybersecurity-fig06_full

      IoT-Cybersecurity-fig07_full
      Authors
      • Headshot of Syed Ali
        Syed Ali
        Partner, Houston
      • Headshot of Ann Bosche
        Ann Bosche
        Partner, San Francisco
      • Headshot of Frank Ford
        Frank Ford
        Partner, London
      Related Industries
      • Cybersecurity
      • Internet of Things
      • Technology
      Related Consulting Services
      • Enterprise Technology
      Technology
      Defining the Battlegrounds of the Internet of Things

      Five IoT battlegrounds present unique growth opportunities.

      Read more
      Technology
      How Providers Can Succeed in the Internet of Things

      Vendors should avoid five common IoT pitfalls.

      Read more
      Telecommunications
      Close to the Core: Telcos' Competitive Advantage in the Internet of Things

      Telecom executives eyeing opportunities in industry services should look critically at connectivity and life cycle management.

      Read more
      Internet of Things
      How Security Concerns Are Holding Back the Internet of Things

      Research shows that business customers would be willing to buy substantially more IoT devices if their concerns about cybersecurity risks were addressed.

      Read more
      Internet of Things
      Coronavirus and Other Shocks: How Resilient Is Your Supply Chain?

      Don’t overlook the risks from second- and third-tier suppliers.

      Read more
      First published in junio 2018
      Tags
      • Cybersecurity
      • Enterprise Technology
      • Internet of Things
      • Internet of Things
      • Technology

      How We've Helped Clients

      How a Data-Driven Mindset Powers McAfee’s Growth

      See more related case studies

      Helping a Midsize ERP Player Compete against the Giants

      See more related case studies

      Aggressively growing an IT service provider with a high-performance culture

      See more related case studies

      Want to continue the conversation

      We help global leaders with their organization's most critical issues and opportunities. Together, we create enduring change and results

      Bain Insights. Our perspectives on critical issues global businesses face in today's challenging environment, delivered monthly.

      *I have read and understand Bain’s Privacy Notice.

      Please read and agree to the Privacy Policy.
      Bain & Company
      Contact us Sustainability Accessibility Terms of use Privacy Modern Slavery Act Statement Cookie Policy Sitemap Log In

      © 1996-2026 Bain & Company, Inc.

      Contact Bain

      How can we help you?

      • Business inquiry
      • Career information
      • Press relations
      • Partnership request
      • Speaker request
      See all offices