publication . Article . 2013

Keystone Business Models for Network Security Processors

Arthur Low; Steven Muegge;
Open Access
  • Published: 24 Jul 2013 Journal: Technology Innovation Management Review, volume 3, pages 25-33 (eissn: 1927-0321, Copyright policy)
  • Publisher: Carleton University
Abstract
Network security processors are critical components of high-performance systems built for cybersecurity. Development of a network security processor requires multi-domain experience in semiconductors and complex software security applications, and multiple iterations of both software and hardware implementations. Limited by the business models in use today, such an arduous task can be undertaken only by large incumbent companies and government organizations. Neither the “fabless semiconductor” models nor the silicon intellectual-property licensing (“IP-licensing”) models allow small technology companies to successfully compete. This article describes an alternat...
Subjects
free text keywords: New business development, Artifact-centric business process model, Network security, business.industry, business, Business ecosystem, Economics, Business model, Commercialization, Entrepreneurship, Software security assurance, Engineering management, Marketing, business ecosystems, business model innovation, cybersecurity, platforms, semiconductors, technology entrepreneurship, Technology (General), T1-995, Management. Industrial management, HD28-70
Related Organizations

Citation: Low, A. and S. Muegge. 2013. Keystone Business Models for Network Security Processors. Technology Innovation Management Review. July 2013: 25-33. [OpenAIRE]

Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Article . 2013

Keystone Business Models for Network Security Processors

Arthur Low; Steven Muegge;