List of Figures
Exhibit 1: Respondents breakdown by industry 8
Exhibit 2: Use cases 10
Exhibit 3: Use cases by countries (Developed markets) 11
Exhibit 4: Use cases by countries (Emerging markets) 12
Exhibit 5: Key benefits expected 13
Exhibit 6: Challenges in getting IoT project off the ground 14
Exhibit 7: Areas of investment 15
Exhibit 8: Geographic scope of deployment 19
Exhibit 9: Scope of deployment by countries 20
Exhibit 10: Type of connectivity used or planning to use 21
Exhibit 11: Short range wireless unlicensed 22
Exhibit 12: Long range wireless unlicensed 23
Exhibit 13: Long range wireless licensed 24
Exhibit 14: Security strategies 25
Exhibit 15: Most significant IoT security risks 26
Exhibit 16: Approach to securing data produced by IoT devices 27
Exhibit 17: Location of Analysis of IoT Data 28
Exhibit 18: Vendor selection criteria 30
Exhibit 19: Preferred vendor 31
Exhibit 20: Internal IoT project management, 2017 32


List of Tables
Exhibit 1: Respondents breakdown by industry 8
Exhibit 2: Use cases 10
Exhibit 3: Use cases by countries (Developed markets) 11
Exhibit 4: Use cases by countries (Emerging markets) 12
Exhibit 5: Key benefits expected 13
Exhibit 6: Challenges in getting IoT project off the ground 14
Exhibit 7: Areas of investment 15
Exhibit 8: Geographic scope of deployment 19
Exhibit 9: Scope of deployment by countries 20
Exhibit 10: Type of connectivity used or planning to use 21
Exhibit 11: Short range wireless unlicensed 22
Exhibit 12: Long range wireless unlicensed 23
Exhibit 13: Long range wireless licensed 24
Exhibit 14: Security strategies 25
Exhibit 15: Most significant IoT security risks 26
Exhibit 16: Approach to securing data produced by IoT devices 27
Exhibit 17: Location of Analysis of IoT Data 28
Exhibit 18: Vendor selection criteria 30
Exhibit 19: Preferred vendor 31
Exhibit 20: Internal IoT project management, 2017 32