SlideShare a Scribd company logo
1 of 12
Download to read offline
FROST & SULLIVAN BEST PRACTICES AWARD
Product Leadership 2019
IOT CYBERSECURITY - NORTH AMERICA
BEST PRACTICES RESEARCH
© Frost & Sullivan 2019 2 “We Accelerate Growth”
Contents
Background and Company Performance ........................................................................3
Industry Challenges..............................................................................................3
Product Family Attributes and Business Impact ........................................................4
Conclusion...........................................................................................................6
Significance of Product Leadership................................................................................7
Understanding Product Leadership................................................................................7
Key Benchmarking Criteria ....................................................................................8
Best Practices Award Analysis for Entrust Datacard ........................................................8
Decision Support Scorecard ...................................................................................8
Product Family Attributes ......................................................................................9
Business Impact...................................................................................................9
Decision Support Matrix ......................................................................................10
Best Practices Recognition: 10 Steps to Researching, Identifying, and Recognizing Best
Practices .................................................................................................................11
The Intersection between 360-Degree Research and Best Practices Awards.....................12
Research Methodology ........................................................................................12
About Frost & Sullivan ..............................................................................................12
BEST PRACTICES RESEARCH
© Frost & Sullivan 2019 3 “We Accelerate Growth”
Background and Company Performance
Industry Challenges
IoT is increasingly permeating every aspect of consumer and enterprise activities. With
the growth of microelectronics, ubiquitous connectivity, and predictive computing, IoT is
poised for rapid growth. The future of IoT involves billions of connected devices
communicating with one another regardless of the manufacturer, operating system,
chipset, or physical transport mode. IoT cybersecurity, however, has not kept up with the
rapid pace of innovation and deployment, creating substantial safety and economic risks.
Whether malicious or accidental, compromised IoT devices can pose significant risks to
consumers, businesses and societies. Not only can cybersecurity attacks cause operational
disruptions, breached devices can also be commandeered to launch cybersecurity attacks
on other devices and systems.
IoT creates new cybersecurity challenges that cannot be adequately addressed by
traditional IT cybersecurity technologies and approaches. While the basic concepts of
protection – such as digital certificates, hardware-based trust, and data encryption –
remain, memory and processor limitations, data velocity, and device volumes present
unique challenges in IoT cybersecurity. Therefore, IoT must be secured by using efficient
technologies that are purpose-built for the machine environment. Technological mega
trends, such as edge, cloud and fog computing, virtualization, software-defined
networking (SDN), 5G, distributed ledger technologies (DLT), and digital and crypto
payments place new demands on cybersecurity that must be addressed to help realize the
benefits of IoT. Providing “security-at-the-speed-of-business” requires consistent new
product innovation and visionary leadership in the dynamic IoT markets. Therefore, in
addition to securing the emerging communication and collaboration mechanisms in the
IoT, cybersecurity solution providers must themselves invest in new technologies to
enhance the performance of their solutions.
Holistic and tiered-offerings that can provide the technological foundations to address the
full spectrum of IoT device provisioning and operational requirements are a key market
need in IoT cybersecurity. Creating a trust framework for IoT starts with establishing
immutable device identities to prevent untrusted devices or applications from
communicating with other devices or components on the network. Other important
attributes for effective IoT security include: 1) the ability to secure device identities and
data, 2) secured data acquisition and ingestion with policy-driven equipment data
management, 3) supporting deep integration of security into modern DevOps to maintain
pace with continuous software development and updates, and 4) facilitating secure
deployment of edge computing and security management capabilities.
It is simply not enough to provide enterprise customers with digital certificates and expect
them to develop whole, workable solutions for their IoT cybersecurity needs (aka- the
“cert pump” model). Frost & Sullivan firmly believes that providers that can offer fully
integrated, managed and consultative solutions for IoT cybersecurity will be positioned
BEST PRACTICES RESEARCH
© Frost & Sullivan 2019 4 “We Accelerate Growth”
favorably in the long run in the IoT cybersecurity markets. While open-source software
can be used to support initial deployments, customers must prefer working with
specialized providers to ensure timely and effective technology upgrades. IoT, as such, is
rapidly migrating to supporting autonomous operations through increased emphasis on
generating, collecting, processing and using sensor data to perform business functions in
real time. The consequences of cybersecurity violations can be severe in such scenarios,
making it critical that highly proven, modular and agile solutions are used for IoT
cybersecurity.
Product Family Attributes and Business Impact
Entrust Datacard is a leading provider of trusted identity and secure transaction
technologies. The company offers solutions ranging from the physical world of financial
cards, passports and identity cards, to the digital realm of authentication, certificates and
secure communications. For IoT, Entrust Datacard offers the ioTrust security solution that
provides IoT value-chain participants with full control of the security mechanisms in their
IoT products, services and deployments. The key success factors for ioTrust are discussed
below.
Product Capabilities
The ioTrust IoT security solution offers a comprehensive, standards-based trust model for
IoT identity and cryptography management. It puts the IoT value-chain participants in full
control of the security mechanisms of their IoT products, services and deployments.
Adopting a three-tiered approach, ioTrust aligns with the security and enablement needs
of manufacturers and operators to establish a secure connected ecosystem. With ioTrust,
IoT device manufacturers can embed trusted identities on their devices, thus facilitating
Secure-by-Design implementations critical to IoT security.
For device operators, ioTrust offers strong authentication, authorization and bi-directional
data flow capabilities to securely operationalize devices using the embedded device trust
anchors and device information. Moreover, it offers identity and data security to operators
for managing the increased number of relationships between devices, applications and
users and enable secure interactions within their operational environment.
New Product Innovation
Entrust Datacard continues to enhance the capabilities of ioTrust to address the device
and data protection needs of the IoT. Examples of recent and upcoming new product
initiatives for ioTrust include:
 Securing software containers through edge ID orchestration and enablement of
cybersecurity functions such as dynamic enrolment and secure certificate lifecycle
management;
BEST PRACTICES RESEARCH
© Frost & Sullivan 2019 5 “We Accelerate Growth”
 Enhanced cybersecurity for brownfield industrial deployments by securing legacy
protocols and devices; and
 Technology and deployment simplification through the use of embeddable agents and
libraries providing secure service discovery and automated device configuration.
The growing need for enterprise customers to move from customized implementations
that struggle to scale or interoperate easily presents additional opportunities for the
company to add value by delivering a structured, organized and auditable security
framework.
Deployment Versatility
ioTrust is implemented in software and can support different types of IoT deployments in
an effective and economical manner. It can also be used to secure brownfield IoT
deployments via its edge gateway offerings. ioTrust components can be deployed as on
premise, hybrid or cloud implementations. It is important to note that while ioTrust can
leverage hardware security elements such as secure elements (SE), Trusted Platform
Modules (TPMs) and hardware security modules (HSMs), the solution is driven by software
which enables Entrust Datacard to be more agile and flexible for cryptographic security in
IoT. Furthermore, the Appliance, Managed Services and On-premise deployment models
for ioTrust allow Entrust Datacard to address the unique deployment needs of its
customers. A proven track record in supporting the cybersecurity requirements of a
diverse range of customers across different industry verticals including industrial,
automotive, smart manufacturing, and telecommunication, is a clear testament to
ioTrust’s versatility and customization capabilities.
Strategic Roadmap
The product roadmap for ioTrust is aligned to address the emerging cybersecurity needs in
IoT. For example, Entrust Datacard is expected to support code signing services for IoT
firmware and application updates. The company’s recent acquisition of Safelayer Secure
Communications S.A will help augment its capabilities for digital signing services. Entrust
Datacard is also expected to deliver enhancements to edge ID services featuring
distributed issuance and management models for micro-services cybersecurity. Greater
focus on data-driven IoT opportunities through secure data acquisition features is also
expected from Entrust Datacard. The recent acquisition of nCipher Security’s general
purpose Hardware Security Module business from Thales will enable the company to
support high assurance use cases based on a range of next-generation digital
transformation tools such as the IoT, virtual payments and blockchain/DLT. Frost &
Sullivan believes management’s focus on deriving greater synergies between its core PKI
team and the IoT cybersecurity teams will significantly enhance the company’s market
position and associated growth opportunities.
BEST PRACTICES RESEARCH
© Frost & Sullivan 2019 6 “We Accelerate Growth”
Competitive Differentiation
The competitive landscape in IoT cybersecurity is comprised of endpoint or library-focused
companies and traditional certificate or root-of-trust providers. Dependency on the
availability of hardware components dedicated to cybersecurity tends to limit the
deployment flexibility for Entrust Datacard competitors. The ability to maintain strong,
dedicated roots of trust – versus using shared roots – to deliver firm cybersecurity
assurance is a key competitive advantage for Entrust Datacard. Entrust Datacard is not
limited to offering only the client libraries – the company offers a full stack solution for IoT
cybersecurity. Frost & Sullivan’s research indicates that Entrust Datacard is among a small
group of companies with the scale, sophistication, systems, and expertise needed to
deliver end-to-end security in IoT.
Unlike competing solutions that require considerable time and monetary investments in
implementing and managing cybersecurity deployments, the managed infrastructure-
centric approach for ioTrust leads to considerable ease of IoT cybersecurity lifecycle
management and has resonated well with enterprise customers. Entrust Datacard has had
notable wins against traditional PKI vendors that are focused on purely cloud issuance and
are not actively assisting enterprise customers with important processes such as key
management or device strategies. With an increased focus on adopting a solutions-
architect approach within its sales organization, Entrust Datacard should maintain its
growth momentum in the IoT cybersecurity markets.
The leading IoT platforms all have a basic set of IoT cybersecurity enablement offerings.
Entrust Datacard participates in the partnership programs of the leading cloud-based IoT
platform providers and offers its software stack in the leading application marketplaces in
a pre-integrated manner for ease of deployment. Therefore, engagement with the
platform providers is a good go-to-market strategy for Entrust Datacard and may not
necessarily be a direct competitive threat for the company. Overall, an innovative product,
the PKI brand, and the stability of the company are the key competitive differentiators for
Entrust Datacard.
Conclusion
Entrust Datacard continues to leverage decades of expertise in cryptography, embedded
systems and trusted infrastructures to ensure the right security level for devices,
applications, systems and users in IoT. Comprehensive product capabilities, strong focus
on new product innovation, exceptional product customization capabilities and deployment
flexibility are the key highlights of the ioTrust IoT cybersecurity solution. Frost & Sullivan
proudly presents Entrust Datacard with the 2019 Product Leadership award in recognition
of its impressive achievements.
BEST PRACTICES RESEARCH
© Frost & Sullivan 2019 7 “We Accelerate Growth”
Significance of Product Leadership
Ultimately, growth in any organization depends upon customers purchasing from a
company and then making the decision to return time and again. A comprehensive
product line, filled with high-quality, value-driven options, is the key to building an
engaged customer base. To achieve and maintain product excellence, an organization
must strive to be best-in-class in three key areas: understanding demand, nurturing the
brand, and differentiating from the competition.
Understanding Product Leadership
Demand forecasting, branding, and differentiating all play a critical role in finding growth
opportunities for your product line. This three-fold focus, however, must be complemented
by an equally rigorous focus on pursuing those opportunities to a best-in-class standard.
Customer communications, customer feedback, pricing, and competitor actions must all be
managed and monitored for ongoing success. If an organization can successfully parlay
product excellence into positive business impact, increased market share will inevitably
follow over time.
BEST PRACTICES RESEARCH
© Frost & Sullivan 2019 8 “We Accelerate Growth”
Key Benchmarking Criteria
For the Product Leadership Award, Frost & Sullivan analysts independently evaluated two
key factors—Product Family Attributes and Business Impact—according to the criteria
identified below.
Product Family Attributes
Criterion 1: Match to Needs
Criterion 2: Reliability and Quality
Criterion 3: Product/Service Value
Criterion 4: Positioning
Criterion 5: Design
Business Impact
Criterion 1: Financial Performance
Criterion 2: Customer Acquisition
Criterion 3: Operational Efficiency
Criterion 4: Growth Potential
Criterion 5: Human Capital
Best Practices Award Analysis for Entrust Datacard
Decision Support Scorecard
To support its evaluation of best practices across multiple business performance
categories, Frost & Sullivan employs a customized Decision Support Scorecard. This tool
allows our research and consulting teams to objectively analyze performance, according to
the key benchmarking criteria listed in the previous section, and to assign ratings on that
basis. The tool follows a 10-point scale that allows for nuances in performance evaluation.
Ratings guidelines are illustrated below.
RATINGS GUIDELINES
The Decision Support Scorecard is organized by Product Family Attributes and Business
Impact (i.e., These are the overarching categories for all 10 benchmarking criteria; the
definitions for each criterion are provided beneath the scorecard.). The research team
confirms the veracity of this weighted scorecard through sensitivity analysis, which
confirms that small changes to the ratings for a specific criterion do not lead to a
significant change in the overall relative rankings of the companies.
BEST PRACTICES RESEARCH
© Frost & Sullivan 2019 9 “We Accelerate Growth”
The results of this analysis are shown below. To remain unbiased and to protect the
interests of all organizations reviewed, we have chosen to refer to the other key
participants as Competitor 2 and Competitor 3.
Measurement of 1–10 (1 = poor; 10 = excellent)
Product Leadership
Product Family
Attributes
Business
Impact
Average
Rating
Entrust Datacard 9.5 9.5 9.5
Competitor 2 8.5 8.5 8.5
Competitor 3 8.2 8.2 8.2
Product Family Attributes
Criterion 1: Match to Needs
Requirement: Customer needs directly influence and inspire the design and positioning of
the product family.
Criterion 2: Reliability and Quality
Requirement: Products consistently meet or exceed customer expectations for
performance and length of service.
Criterion 3: Product/Service Value
Requirement: Products or services offer the best value for the price, compared to similar
offerings in the market.
Criterion 4: Positioning
Requirement: Products or services address unique, unmet need that competitors cannot
easily replicate or replace.
Criterion 5: Design
Requirement: The product features an innovative design, enhancing both visual appeal
and ease of use.
Business Impact
Criterion 1: Financial Performance
Requirement: Overall financial performance is strong in terms of revenues, revenue
growth, operating margin, and other key financial metrics.
Criterion 2: Customer Acquisition
Requirement: Product strength enables acquisition of new customers, even as it enhances
retention of current customers.
Criterion 3: Operational Efficiency
Requirement: Staff is able to perform assigned tasks productively, quickly, and to a high
quality standard.
BEST PRACTICES RESEARCH
© Frost & Sullivan 2019 10 “We Accelerate Growth”
Criterion 4: Growth Potential
Requirements: Product quality strengthens brand, reinforces customer loyalty, and
enhances growth potential.
Criterion 5: Human Capital
Requirement: Company culture is characterized by a strong commitment to product
quality and customer impact, which in turn enhances employee morale and retention.
Decision Support Matrix
Once all companies have been evaluated according to the Decision Support Scorecard,
analysts then position the candidates on the matrix shown below, enabling them to
visualize which companies are truly breakthrough and which ones are not yet operating at
best-in-class levels.
High
Low
Low High
BusinessImpact
Product Family Attributes
Entrust
Datacard
Competitor 2
Competitor 3
BEST PRACTICES RESEARCH
© Frost & Sullivan 2019 11 “We Accelerate Growth”
Best Practices Recognition: 10 Steps to Researching,
Identifying, and Recognizing Best Practices
Frost & Sullivan analysts follow a 10-step process to evaluate Award candidates and
assess their fit with select best practice criteria. The reputation and integrity of the
Awards are based on close adherence to this process.
STEP OBJECTIVE KEY ACTIVITIES OUTPUT
1
Monitor,
target, and
screen
Identify Award recipient
candidates from around the
globe
 Conduct in-depth industry
research
 Identify emerging sectors
 Scan multiple geographies
Pipeline of candidates who
potentially meet all best-
practice criteria
2
Perform
360-degree
research
Perform comprehensive,
360-degree research on all
candidates in the pipeline
 Interview thought leaders
and industry practitioners
 Assess candidates’ fit with
best-practice criteria
 Rank all candidates
Matrix positioning of all
candidates’ performance
relative to one another
3
Invite
thought
leadership in
best
practices
Perform in-depth
examination of all candidates
 Confirm best-practice criteria
 Examine eligibility of all
candidates
 Identify any information gaps
Detailed profiles of all
ranked candidates
4
Initiate
research
director
review
Conduct an unbiased
evaluation of all candidate
profiles
 Brainstorm ranking options
 Invite multiple perspectives
on candidates’ performance
 Update candidate profiles
Final prioritization of all
eligible candidates and
companion best-practice
positioning paper
5
Assemble
panel of
industry
experts
Present findings to an expert
panel of industry thought
leaders
 Share findings
 Strengthen cases for
candidate eligibility
 Prioritize candidates
Refined list of prioritized
Award candidates
6
Conduct
global
industry
review
Build consensus on Award
candidates’ eligibility
 Hold global team meeting to
review all candidates
 Pressure-test fit with criteria
 Confirm inclusion of all
eligible candidates
Final list of eligible Award
candidates, representing
success stories worldwide
7
Perform
quality check
Develop official Award
consideration materials
 Perform final performance
benchmarking activities
 Write nominations
 Perform quality review
High-quality, accurate, and
creative presentation of
nominees’ successes
8
Reconnect
with panel of
industry
experts
Finalize the selection of the
best-practice Award recipient
 Review analysis with panel
 Build consensus
 Select recipient
Decision on which company
performs best against all
best-practice criteria
9
Communicate
recognition
Inform Award recipient of
Award recognition
 Present Award to the CEO
 Inspire the organization for
continued success
 Celebrate the recipient’s
performance
Announcement of Award
and plan for how recipient
can use the Award to
enhance the brand
10
Take
strategic
action
Upon licensing, company is
able to share Award news
with stakeholders and
customers
 Coordinate media outreach
 Design a marketing plan
 Assess Award’s role in future
strategic planning
Widespread awareness of
recipient’s Award status
among investors, media
personnel, and employees
BEST PRACTICES RESEARCH
© Frost & Sullivan 2019 12 “We Accelerate Growth”
The Intersection between 360-Degree Research and Best
Practices Awards
Research Methodology
Frost & Sullivan’s 360-degree research
methodology represents the analytical
rigor of our research process. It offers a
360-degree-view of industry challenges,
trends, and issues by integrating all 7 of
Frost & Sullivan's research methodologies.
Too often companies make important
growth decisions based on a narrow
understanding of their environment,
leading to errors of both omission and
commission. Successful growth strategies
are founded on a thorough understanding
of market, technical, economic, financial,
customer, best practices, and
demographic analyses. The integration of
these research disciplines into the 360-
degree research methodology provides an
evaluation platform for benchmarking
industry participants and for identifying those performing at best-in-class levels.
About Frost & Sullivan
Frost & Sullivan, the Growth Partnership Company, enables clients to accelerate growth
and achieve best-in-class positions in growth, innovation and leadership. The company's
Growth Partnership Service provides the CEO and the CEO's Growth Team with disciplined
research and best practice models to drive the generation, evaluation, and implementation
of powerful growth strategies. Frost & Sullivan leverages more than 50 years of
experience in partnering with Global 1000 companies, emerging businesses, and the
investment community from 45 offices on six continents. To join our Growth Partnership,
please visit http://www.frost.com.
360-DEGREE RESEARCH: SEEING ORDER IN
THE CHAOS

More Related Content

What's hot

Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkClearnetwork
 
UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsCisco Case Studies
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecurityCigniti Technologies Ltd
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationCreus Moreira Carlos
 
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET-  	  Secured Real Estate Transactions using Blockchain TechnologyIRJET-  	  Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain TechnologyIRJET Journal
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of ThingsCognizant
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperMartin Ruubel
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Market Engel SAS
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Unisys Corporation
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudUlf Mattsson
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET Journal
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Ulf Mattsson
 
IRJET - BI: Blockchain in Insurance
IRJET -  	  BI: Blockchain in InsuranceIRJET -  	  BI: Blockchain in Insurance
IRJET - BI: Blockchain in InsuranceIRJET Journal
 
The 10 most trusted companies in enterprise security for dec 2017
The 10 most trusted companies in enterprise security for dec 2017The 10 most trusted companies in enterprise security for dec 2017
The 10 most trusted companies in enterprise security for dec 2017Merry D'souza
 
Cloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Insecurity and True Accountability - Guardtime WhitepaperCloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Insecurity and True Accountability - Guardtime WhitepaperMartin Ruubel
 
Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Ubisecure
 
The 10 most intelligent identity & access management solution providers 2020.
The 10 most intelligent identity & access management solution providers  2020.The 10 most intelligent identity & access management solution providers  2020.
The 10 most intelligent identity & access management solution providers 2020.Merry D'souza
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonUlf Mattsson
 
Aditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyAditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyUbisecure
 

What's hot (20)

Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
UniCredit Business Integrated Solutions
UniCredit Business Integrated SolutionsUniCredit Business Integrated Solutions
UniCredit Business Integrated Solutions
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
 
IRJET- Secured Real Estate Transactions using Blockchain Technology
IRJET-  	  Secured Real Estate Transactions using Blockchain TechnologyIRJET-  	  Secured Real Estate Transactions using Blockchain Technology
IRJET- Secured Real Estate Transactions using Blockchain Technology
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
 
Where Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the CloudWhere Data Security and Value of Data Meet in the Cloud
Where Data Security and Value of Data Meet in the Cloud
 
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of ThingsIRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
 
IRJET - BI: Blockchain in Insurance
IRJET -  	  BI: Blockchain in InsuranceIRJET -  	  BI: Blockchain in Insurance
IRJET - BI: Blockchain in Insurance
 
The 10 most trusted companies in enterprise security for dec 2017
The 10 most trusted companies in enterprise security for dec 2017The 10 most trusted companies in enterprise security for dec 2017
The 10 most trusted companies in enterprise security for dec 2017
 
Cloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Insecurity and True Accountability - Guardtime WhitepaperCloud Insecurity and True Accountability - Guardtime Whitepaper
Cloud Insecurity and True Accountability - Guardtime Whitepaper
 
Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018Kantara - Digital Identity in 2018
Kantara - Digital Identity in 2018
 
The 10 most intelligent identity & access management solution providers 2020.
The 10 most intelligent identity & access management solution providers  2020.The 10 most intelligent identity & access management solution providers  2020.
The 10 most intelligent identity & access management solution providers 2020.
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 
Aditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategyAditro - IAM as part of Cloud Business strategy
Aditro - IAM as part of Cloud Business strategy
 

Similar to Frost Entrust Datacard-award-write-up-final

Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Ulf Mattsson
 
Intel Corporation Award Write Up
Intel Corporation Award Write UpIntel Corporation Award Write Up
Intel Corporation Award Write UpClaudia Toscano
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...LabSharegroup
 
Meeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesMeeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesSymantec
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlockArmour1
 
Midokura for Industry 4.0
Midokura for Industry 4.0Midokura for Industry 4.0
Midokura for Industry 4.0Susan Wu
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecuritySatyaKVivek
 
IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...
IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...
IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...Dark Bears
 
Top 30 Internet Of Things (IoT) Companies In The USA.pdf
Top 30 Internet Of Things (IoT) Companies In The USA.pdfTop 30 Internet Of Things (IoT) Companies In The USA.pdf
Top 30 Internet Of Things (IoT) Companies In The USA.pdfLucas Lagone
 
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_USSecuring_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_USIngrid Fernandez, PhD
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0Osama Shahumi
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report SummaryAccenture Technology
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportAccenture Technology
 
Connecting Physical and Digital Worlds to Power the Industrial IoT
Connecting Physical and Digital Worlds to Power the Industrial IoTConnecting Physical and Digital Worlds to Power the Industrial IoT
Connecting Physical and Digital Worlds to Power the Industrial IoTCognizant
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsNirmal Misra
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1pStéphane Roule
 
Case Study Intel IoT Gateway
Case Study Intel IoT GatewayCase Study Intel IoT Gateway
Case Study Intel IoT GatewayJohn Koot
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE코리아
 

Similar to Frost Entrust Datacard-award-write-up-final (20)

Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017Security for iot and cloud aug 25b 2017
Security for iot and cloud aug 25b 2017
 
Intel Corporation Award Write Up
Intel Corporation Award Write UpIntel Corporation Award Write Up
Intel Corporation Award Write Up
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Meeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security ChallengesMeeting Mobile and BYOD Security Challenges
Meeting Mobile and BYOD Security Challenges
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
 
Midokura for Industry 4.0
Midokura for Industry 4.0Midokura for Industry 4.0
Midokura for Industry 4.0
 
Cisco Award Write Up
Cisco Award Write UpCisco Award Write Up
Cisco Award Write Up
 
Best Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT SecurityBest Practices for Cloud-Based IoT Security
Best Practices for Cloud-Based IoT Security
 
IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...
IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...
IoT Security Why Hiring Skilled Developers is Crucial for Protecting Your Dev...
 
Top 30 Internet Of Things (IoT) Companies In The USA.pdf
Top 30 Internet Of Things (IoT) Companies In The USA.pdfTop 30 Internet Of Things (IoT) Companies In The USA.pdf
Top 30 Internet Of Things (IoT) Companies In The USA.pdf
 
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_USSecuring_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
Securing_your_Internet_of_Things_from_the_ground_up_white_paper_EN_US
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
 
Trends in IoT 2017
Trends in IoT 2017Trends in IoT 2017
Trends in IoT 2017
 
Security for the IoT - Report Summary
Security for the IoT - Report SummarySecurity for the IoT - Report Summary
Security for the IoT - Report Summary
 
Security Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive ReportSecurity Implications of Accenture Technology Vision 2015 - Executive Report
Security Implications of Accenture Technology Vision 2015 - Executive Report
 
Connecting Physical and Digital Worlds to Power the Industrial IoT
Connecting Physical and Digital Worlds to Power the Industrial IoTConnecting Physical and Digital Worlds to Power the Industrial IoT
Connecting Physical and Digital Worlds to Power the Industrial IoT
 
Reinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of ThingsReinventing Cybersecurity in the Internet of Things
Reinventing Cybersecurity in the Internet of Things
 
151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p151022_oml_reinventing_cybersecurity_IoT_v1p
151022_oml_reinventing_cybersecurity_IoT_v1p
 
Case Study Intel IoT Gateway
Case Study Intel IoT GatewayCase Study Intel IoT Gateway
Case Study Intel IoT Gateway
 
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)GE디지털 월드테크 브로셔(GE Digital Wurldtech)
GE디지털 월드테크 브로셔(GE Digital Wurldtech)
 

Frost Entrust Datacard-award-write-up-final

  • 1. FROST & SULLIVAN BEST PRACTICES AWARD Product Leadership 2019 IOT CYBERSECURITY - NORTH AMERICA
  • 2. BEST PRACTICES RESEARCH © Frost & Sullivan 2019 2 “We Accelerate Growth” Contents Background and Company Performance ........................................................................3 Industry Challenges..............................................................................................3 Product Family Attributes and Business Impact ........................................................4 Conclusion...........................................................................................................6 Significance of Product Leadership................................................................................7 Understanding Product Leadership................................................................................7 Key Benchmarking Criteria ....................................................................................8 Best Practices Award Analysis for Entrust Datacard ........................................................8 Decision Support Scorecard ...................................................................................8 Product Family Attributes ......................................................................................9 Business Impact...................................................................................................9 Decision Support Matrix ......................................................................................10 Best Practices Recognition: 10 Steps to Researching, Identifying, and Recognizing Best Practices .................................................................................................................11 The Intersection between 360-Degree Research and Best Practices Awards.....................12 Research Methodology ........................................................................................12 About Frost & Sullivan ..............................................................................................12
  • 3. BEST PRACTICES RESEARCH © Frost & Sullivan 2019 3 “We Accelerate Growth” Background and Company Performance Industry Challenges IoT is increasingly permeating every aspect of consumer and enterprise activities. With the growth of microelectronics, ubiquitous connectivity, and predictive computing, IoT is poised for rapid growth. The future of IoT involves billions of connected devices communicating with one another regardless of the manufacturer, operating system, chipset, or physical transport mode. IoT cybersecurity, however, has not kept up with the rapid pace of innovation and deployment, creating substantial safety and economic risks. Whether malicious or accidental, compromised IoT devices can pose significant risks to consumers, businesses and societies. Not only can cybersecurity attacks cause operational disruptions, breached devices can also be commandeered to launch cybersecurity attacks on other devices and systems. IoT creates new cybersecurity challenges that cannot be adequately addressed by traditional IT cybersecurity technologies and approaches. While the basic concepts of protection – such as digital certificates, hardware-based trust, and data encryption – remain, memory and processor limitations, data velocity, and device volumes present unique challenges in IoT cybersecurity. Therefore, IoT must be secured by using efficient technologies that are purpose-built for the machine environment. Technological mega trends, such as edge, cloud and fog computing, virtualization, software-defined networking (SDN), 5G, distributed ledger technologies (DLT), and digital and crypto payments place new demands on cybersecurity that must be addressed to help realize the benefits of IoT. Providing “security-at-the-speed-of-business” requires consistent new product innovation and visionary leadership in the dynamic IoT markets. Therefore, in addition to securing the emerging communication and collaboration mechanisms in the IoT, cybersecurity solution providers must themselves invest in new technologies to enhance the performance of their solutions. Holistic and tiered-offerings that can provide the technological foundations to address the full spectrum of IoT device provisioning and operational requirements are a key market need in IoT cybersecurity. Creating a trust framework for IoT starts with establishing immutable device identities to prevent untrusted devices or applications from communicating with other devices or components on the network. Other important attributes for effective IoT security include: 1) the ability to secure device identities and data, 2) secured data acquisition and ingestion with policy-driven equipment data management, 3) supporting deep integration of security into modern DevOps to maintain pace with continuous software development and updates, and 4) facilitating secure deployment of edge computing and security management capabilities. It is simply not enough to provide enterprise customers with digital certificates and expect them to develop whole, workable solutions for their IoT cybersecurity needs (aka- the “cert pump” model). Frost & Sullivan firmly believes that providers that can offer fully integrated, managed and consultative solutions for IoT cybersecurity will be positioned
  • 4. BEST PRACTICES RESEARCH © Frost & Sullivan 2019 4 “We Accelerate Growth” favorably in the long run in the IoT cybersecurity markets. While open-source software can be used to support initial deployments, customers must prefer working with specialized providers to ensure timely and effective technology upgrades. IoT, as such, is rapidly migrating to supporting autonomous operations through increased emphasis on generating, collecting, processing and using sensor data to perform business functions in real time. The consequences of cybersecurity violations can be severe in such scenarios, making it critical that highly proven, modular and agile solutions are used for IoT cybersecurity. Product Family Attributes and Business Impact Entrust Datacard is a leading provider of trusted identity and secure transaction technologies. The company offers solutions ranging from the physical world of financial cards, passports and identity cards, to the digital realm of authentication, certificates and secure communications. For IoT, Entrust Datacard offers the ioTrust security solution that provides IoT value-chain participants with full control of the security mechanisms in their IoT products, services and deployments. The key success factors for ioTrust are discussed below. Product Capabilities The ioTrust IoT security solution offers a comprehensive, standards-based trust model for IoT identity and cryptography management. It puts the IoT value-chain participants in full control of the security mechanisms of their IoT products, services and deployments. Adopting a three-tiered approach, ioTrust aligns with the security and enablement needs of manufacturers and operators to establish a secure connected ecosystem. With ioTrust, IoT device manufacturers can embed trusted identities on their devices, thus facilitating Secure-by-Design implementations critical to IoT security. For device operators, ioTrust offers strong authentication, authorization and bi-directional data flow capabilities to securely operationalize devices using the embedded device trust anchors and device information. Moreover, it offers identity and data security to operators for managing the increased number of relationships between devices, applications and users and enable secure interactions within their operational environment. New Product Innovation Entrust Datacard continues to enhance the capabilities of ioTrust to address the device and data protection needs of the IoT. Examples of recent and upcoming new product initiatives for ioTrust include:  Securing software containers through edge ID orchestration and enablement of cybersecurity functions such as dynamic enrolment and secure certificate lifecycle management;
  • 5. BEST PRACTICES RESEARCH © Frost & Sullivan 2019 5 “We Accelerate Growth”  Enhanced cybersecurity for brownfield industrial deployments by securing legacy protocols and devices; and  Technology and deployment simplification through the use of embeddable agents and libraries providing secure service discovery and automated device configuration. The growing need for enterprise customers to move from customized implementations that struggle to scale or interoperate easily presents additional opportunities for the company to add value by delivering a structured, organized and auditable security framework. Deployment Versatility ioTrust is implemented in software and can support different types of IoT deployments in an effective and economical manner. It can also be used to secure brownfield IoT deployments via its edge gateway offerings. ioTrust components can be deployed as on premise, hybrid or cloud implementations. It is important to note that while ioTrust can leverage hardware security elements such as secure elements (SE), Trusted Platform Modules (TPMs) and hardware security modules (HSMs), the solution is driven by software which enables Entrust Datacard to be more agile and flexible for cryptographic security in IoT. Furthermore, the Appliance, Managed Services and On-premise deployment models for ioTrust allow Entrust Datacard to address the unique deployment needs of its customers. A proven track record in supporting the cybersecurity requirements of a diverse range of customers across different industry verticals including industrial, automotive, smart manufacturing, and telecommunication, is a clear testament to ioTrust’s versatility and customization capabilities. Strategic Roadmap The product roadmap for ioTrust is aligned to address the emerging cybersecurity needs in IoT. For example, Entrust Datacard is expected to support code signing services for IoT firmware and application updates. The company’s recent acquisition of Safelayer Secure Communications S.A will help augment its capabilities for digital signing services. Entrust Datacard is also expected to deliver enhancements to edge ID services featuring distributed issuance and management models for micro-services cybersecurity. Greater focus on data-driven IoT opportunities through secure data acquisition features is also expected from Entrust Datacard. The recent acquisition of nCipher Security’s general purpose Hardware Security Module business from Thales will enable the company to support high assurance use cases based on a range of next-generation digital transformation tools such as the IoT, virtual payments and blockchain/DLT. Frost & Sullivan believes management’s focus on deriving greater synergies between its core PKI team and the IoT cybersecurity teams will significantly enhance the company’s market position and associated growth opportunities.
  • 6. BEST PRACTICES RESEARCH © Frost & Sullivan 2019 6 “We Accelerate Growth” Competitive Differentiation The competitive landscape in IoT cybersecurity is comprised of endpoint or library-focused companies and traditional certificate or root-of-trust providers. Dependency on the availability of hardware components dedicated to cybersecurity tends to limit the deployment flexibility for Entrust Datacard competitors. The ability to maintain strong, dedicated roots of trust – versus using shared roots – to deliver firm cybersecurity assurance is a key competitive advantage for Entrust Datacard. Entrust Datacard is not limited to offering only the client libraries – the company offers a full stack solution for IoT cybersecurity. Frost & Sullivan’s research indicates that Entrust Datacard is among a small group of companies with the scale, sophistication, systems, and expertise needed to deliver end-to-end security in IoT. Unlike competing solutions that require considerable time and monetary investments in implementing and managing cybersecurity deployments, the managed infrastructure- centric approach for ioTrust leads to considerable ease of IoT cybersecurity lifecycle management and has resonated well with enterprise customers. Entrust Datacard has had notable wins against traditional PKI vendors that are focused on purely cloud issuance and are not actively assisting enterprise customers with important processes such as key management or device strategies. With an increased focus on adopting a solutions- architect approach within its sales organization, Entrust Datacard should maintain its growth momentum in the IoT cybersecurity markets. The leading IoT platforms all have a basic set of IoT cybersecurity enablement offerings. Entrust Datacard participates in the partnership programs of the leading cloud-based IoT platform providers and offers its software stack in the leading application marketplaces in a pre-integrated manner for ease of deployment. Therefore, engagement with the platform providers is a good go-to-market strategy for Entrust Datacard and may not necessarily be a direct competitive threat for the company. Overall, an innovative product, the PKI brand, and the stability of the company are the key competitive differentiators for Entrust Datacard. Conclusion Entrust Datacard continues to leverage decades of expertise in cryptography, embedded systems and trusted infrastructures to ensure the right security level for devices, applications, systems and users in IoT. Comprehensive product capabilities, strong focus on new product innovation, exceptional product customization capabilities and deployment flexibility are the key highlights of the ioTrust IoT cybersecurity solution. Frost & Sullivan proudly presents Entrust Datacard with the 2019 Product Leadership award in recognition of its impressive achievements.
  • 7. BEST PRACTICES RESEARCH © Frost & Sullivan 2019 7 “We Accelerate Growth” Significance of Product Leadership Ultimately, growth in any organization depends upon customers purchasing from a company and then making the decision to return time and again. A comprehensive product line, filled with high-quality, value-driven options, is the key to building an engaged customer base. To achieve and maintain product excellence, an organization must strive to be best-in-class in three key areas: understanding demand, nurturing the brand, and differentiating from the competition. Understanding Product Leadership Demand forecasting, branding, and differentiating all play a critical role in finding growth opportunities for your product line. This three-fold focus, however, must be complemented by an equally rigorous focus on pursuing those opportunities to a best-in-class standard. Customer communications, customer feedback, pricing, and competitor actions must all be managed and monitored for ongoing success. If an organization can successfully parlay product excellence into positive business impact, increased market share will inevitably follow over time.
  • 8. BEST PRACTICES RESEARCH © Frost & Sullivan 2019 8 “We Accelerate Growth” Key Benchmarking Criteria For the Product Leadership Award, Frost & Sullivan analysts independently evaluated two key factors—Product Family Attributes and Business Impact—according to the criteria identified below. Product Family Attributes Criterion 1: Match to Needs Criterion 2: Reliability and Quality Criterion 3: Product/Service Value Criterion 4: Positioning Criterion 5: Design Business Impact Criterion 1: Financial Performance Criterion 2: Customer Acquisition Criterion 3: Operational Efficiency Criterion 4: Growth Potential Criterion 5: Human Capital Best Practices Award Analysis for Entrust Datacard Decision Support Scorecard To support its evaluation of best practices across multiple business performance categories, Frost & Sullivan employs a customized Decision Support Scorecard. This tool allows our research and consulting teams to objectively analyze performance, according to the key benchmarking criteria listed in the previous section, and to assign ratings on that basis. The tool follows a 10-point scale that allows for nuances in performance evaluation. Ratings guidelines are illustrated below. RATINGS GUIDELINES The Decision Support Scorecard is organized by Product Family Attributes and Business Impact (i.e., These are the overarching categories for all 10 benchmarking criteria; the definitions for each criterion are provided beneath the scorecard.). The research team confirms the veracity of this weighted scorecard through sensitivity analysis, which confirms that small changes to the ratings for a specific criterion do not lead to a significant change in the overall relative rankings of the companies.
  • 9. BEST PRACTICES RESEARCH © Frost & Sullivan 2019 9 “We Accelerate Growth” The results of this analysis are shown below. To remain unbiased and to protect the interests of all organizations reviewed, we have chosen to refer to the other key participants as Competitor 2 and Competitor 3. Measurement of 1–10 (1 = poor; 10 = excellent) Product Leadership Product Family Attributes Business Impact Average Rating Entrust Datacard 9.5 9.5 9.5 Competitor 2 8.5 8.5 8.5 Competitor 3 8.2 8.2 8.2 Product Family Attributes Criterion 1: Match to Needs Requirement: Customer needs directly influence and inspire the design and positioning of the product family. Criterion 2: Reliability and Quality Requirement: Products consistently meet or exceed customer expectations for performance and length of service. Criterion 3: Product/Service Value Requirement: Products or services offer the best value for the price, compared to similar offerings in the market. Criterion 4: Positioning Requirement: Products or services address unique, unmet need that competitors cannot easily replicate or replace. Criterion 5: Design Requirement: The product features an innovative design, enhancing both visual appeal and ease of use. Business Impact Criterion 1: Financial Performance Requirement: Overall financial performance is strong in terms of revenues, revenue growth, operating margin, and other key financial metrics. Criterion 2: Customer Acquisition Requirement: Product strength enables acquisition of new customers, even as it enhances retention of current customers. Criterion 3: Operational Efficiency Requirement: Staff is able to perform assigned tasks productively, quickly, and to a high quality standard.
  • 10. BEST PRACTICES RESEARCH © Frost & Sullivan 2019 10 “We Accelerate Growth” Criterion 4: Growth Potential Requirements: Product quality strengthens brand, reinforces customer loyalty, and enhances growth potential. Criterion 5: Human Capital Requirement: Company culture is characterized by a strong commitment to product quality and customer impact, which in turn enhances employee morale and retention. Decision Support Matrix Once all companies have been evaluated according to the Decision Support Scorecard, analysts then position the candidates on the matrix shown below, enabling them to visualize which companies are truly breakthrough and which ones are not yet operating at best-in-class levels. High Low Low High BusinessImpact Product Family Attributes Entrust Datacard Competitor 2 Competitor 3
  • 11. BEST PRACTICES RESEARCH © Frost & Sullivan 2019 11 “We Accelerate Growth” Best Practices Recognition: 10 Steps to Researching, Identifying, and Recognizing Best Practices Frost & Sullivan analysts follow a 10-step process to evaluate Award candidates and assess their fit with select best practice criteria. The reputation and integrity of the Awards are based on close adherence to this process. STEP OBJECTIVE KEY ACTIVITIES OUTPUT 1 Monitor, target, and screen Identify Award recipient candidates from around the globe  Conduct in-depth industry research  Identify emerging sectors  Scan multiple geographies Pipeline of candidates who potentially meet all best- practice criteria 2 Perform 360-degree research Perform comprehensive, 360-degree research on all candidates in the pipeline  Interview thought leaders and industry practitioners  Assess candidates’ fit with best-practice criteria  Rank all candidates Matrix positioning of all candidates’ performance relative to one another 3 Invite thought leadership in best practices Perform in-depth examination of all candidates  Confirm best-practice criteria  Examine eligibility of all candidates  Identify any information gaps Detailed profiles of all ranked candidates 4 Initiate research director review Conduct an unbiased evaluation of all candidate profiles  Brainstorm ranking options  Invite multiple perspectives on candidates’ performance  Update candidate profiles Final prioritization of all eligible candidates and companion best-practice positioning paper 5 Assemble panel of industry experts Present findings to an expert panel of industry thought leaders  Share findings  Strengthen cases for candidate eligibility  Prioritize candidates Refined list of prioritized Award candidates 6 Conduct global industry review Build consensus on Award candidates’ eligibility  Hold global team meeting to review all candidates  Pressure-test fit with criteria  Confirm inclusion of all eligible candidates Final list of eligible Award candidates, representing success stories worldwide 7 Perform quality check Develop official Award consideration materials  Perform final performance benchmarking activities  Write nominations  Perform quality review High-quality, accurate, and creative presentation of nominees’ successes 8 Reconnect with panel of industry experts Finalize the selection of the best-practice Award recipient  Review analysis with panel  Build consensus  Select recipient Decision on which company performs best against all best-practice criteria 9 Communicate recognition Inform Award recipient of Award recognition  Present Award to the CEO  Inspire the organization for continued success  Celebrate the recipient’s performance Announcement of Award and plan for how recipient can use the Award to enhance the brand 10 Take strategic action Upon licensing, company is able to share Award news with stakeholders and customers  Coordinate media outreach  Design a marketing plan  Assess Award’s role in future strategic planning Widespread awareness of recipient’s Award status among investors, media personnel, and employees
  • 12. BEST PRACTICES RESEARCH © Frost & Sullivan 2019 12 “We Accelerate Growth” The Intersection between 360-Degree Research and Best Practices Awards Research Methodology Frost & Sullivan’s 360-degree research methodology represents the analytical rigor of our research process. It offers a 360-degree-view of industry challenges, trends, and issues by integrating all 7 of Frost & Sullivan's research methodologies. Too often companies make important growth decisions based on a narrow understanding of their environment, leading to errors of both omission and commission. Successful growth strategies are founded on a thorough understanding of market, technical, economic, financial, customer, best practices, and demographic analyses. The integration of these research disciplines into the 360- degree research methodology provides an evaluation platform for benchmarking industry participants and for identifying those performing at best-in-class levels. About Frost & Sullivan Frost & Sullivan, the Growth Partnership Company, enables clients to accelerate growth and achieve best-in-class positions in growth, innovation and leadership. The company's Growth Partnership Service provides the CEO and the CEO's Growth Team with disciplined research and best practice models to drive the generation, evaluation, and implementation of powerful growth strategies. Frost & Sullivan leverages more than 50 years of experience in partnering with Global 1000 companies, emerging businesses, and the investment community from 45 offices on six continents. To join our Growth Partnership, please visit http://www.frost.com. 360-DEGREE RESEARCH: SEEING ORDER IN THE CHAOS