ILS takes pole position in ABI's M2M security market assessment
ILS Technology is the top vendor in the machine-to-machine security market, followed by Axeda and Sierra Wireless, according to a competitive market assessment conducted by ABI Research.
ABI ranked vendors on a number of criteria, including product implementation and vendor innovation.
In the product implementation category, ILS ranked first, followed by Axeda and Numerex. In the vendor innovation category, Axeda took the top spot, followed by ILS Technology and Sierra Wireless.
"As critical applications in M2M become more popular, M2M vendors will increasingly incorporate security as a key feature. The M2M network and application security markets offer plenty of potential, with the M2M market in full swing and the increasing number of opportunities will mean a surge in popularity," said Michela Menting, a senior analyst.
As more enterprises implement M2M technology, particularly wireless-based M2M, security will become an increasingly important aspect of M2M vendor selection. "Those vendors with a leading edge in regulatory and compliance security stand a very good chance of dominating the market as critical sectors increasingly make use of M2M platforms," Menting notes.
Kathryn Weldon, a principal analyst for enterprise mobility at research firm Current Analysis, agrees that enterprises will increasingly focus on security when selecting and implementing M2M solutions. "If M2M grows the way the ecosystem hopes it will, there will be millions and even billions of end points sending continuous (as well as more sporadic) data across wired and wireless networks, including proprietary and mission-critical pieces of information about customers and businesses," Weldon noted in a blog.
In related news, ILS Technology was recently acquired by U.K.-based Telit Communications for $8.5 million in cash. Robin Duke-Woolley, CEO of Beechman Research, notes that the acquisition "represents a critical move up the value chain from supplying modules, remote module management and connectivity to providing application support as well--in other words, supporting the management of the M2M data flowing through the connectivity."