Keystone Business Models for Network Security Processors

Network security processors are critical components of high-performance systems built for cybersecurity. Development of a network security processor requires multi-domain experience in semiconductors and complex software security applications, and multiple iterations of both software and hardware im...

Full description

Bibliographic Details
Main Authors: Arthur Low, Steven Muegge
Format: Article
Language:English
Published: Carleton University 2013-07-01
Series:Technology Innovation Management Review
Subjects:
Online Access:http://timreview.ca/sites/default/files/article_PDF/LowMuegge_TIMReview_July2013.pdf
id doaj-a7e15ec1aede4cfba2cbe7942a692eba
record_format Article
spelling doaj-a7e15ec1aede4cfba2cbe7942a692eba2020-11-25T02:49:55ZengCarleton UniversityTechnology Innovation Management Review1927-03212013-07-01July 2013: Cybersecurity2533Keystone Business Models for Network Security ProcessorsArthur LowSteven MueggeNetwork security processors are critical components of high-performance systems built for cybersecurity. Development of a network security processor requires multi-domain experience in semiconductors and complex software security applications, and multiple iterations of both software and hardware implementations. Limited by the business models in use today, such an arduous task can be undertaken only by large incumbent companies and government organizations. Neither the “fabless semiconductor” models nor the silicon intellectual-property licensing (“IP-licensing”) models allow small technology companies to successfully compete. This article describes an alternative approach that produces an ongoing stream of novel network security processors for niche markets through continuous innovation by both large and small companies. This approach, referred to here as the "business ecosystem model for network security processors", includes a flexible and reconfigurable technology platform, a “keystone” business model for the company that maintains the platform architecture, and an extended ecosystem of companies that both contribute and share in the value created by innovation. New opportunities for business model innovation by participating companies are made possible by the ecosystem model. This ecosystem model builds on: i) the lessons learned from the experience of the first author as a senior integrated circuit architect for providers of public-key cryptography solutions and as the owner of a semiconductor startup, and ii) the latest scholarly research on technology entrepreneurship, business models, platforms, and business ecosystems. This article will be of interest to all technology entrepreneurs, but it will be of particular interest to owners of small companies that provide security solutions and to specialized security professionals seeking to launch their own companies. http://timreview.ca/sites/default/files/article_PDF/LowMuegge_TIMReview_July2013.pdfbusiness ecosystemsbusiness model innovationcommercializationcybersecurityplatformssemiconductorstechnology entrepreneurship
collection DOAJ
language English
format Article
sources DOAJ
author Arthur Low
Steven Muegge
spellingShingle Arthur Low
Steven Muegge
Keystone Business Models for Network Security Processors
Technology Innovation Management Review
business ecosystems
business model innovation
commercialization
cybersecurity
platforms
semiconductors
technology entrepreneurship
author_facet Arthur Low
Steven Muegge
author_sort Arthur Low
title Keystone Business Models for Network Security Processors
title_short Keystone Business Models for Network Security Processors
title_full Keystone Business Models for Network Security Processors
title_fullStr Keystone Business Models for Network Security Processors
title_full_unstemmed Keystone Business Models for Network Security Processors
title_sort keystone business models for network security processors
publisher Carleton University
series Technology Innovation Management Review
issn 1927-0321
publishDate 2013-07-01
description Network security processors are critical components of high-performance systems built for cybersecurity. Development of a network security processor requires multi-domain experience in semiconductors and complex software security applications, and multiple iterations of both software and hardware implementations. Limited by the business models in use today, such an arduous task can be undertaken only by large incumbent companies and government organizations. Neither the “fabless semiconductor” models nor the silicon intellectual-property licensing (“IP-licensing”) models allow small technology companies to successfully compete. This article describes an alternative approach that produces an ongoing stream of novel network security processors for niche markets through continuous innovation by both large and small companies. This approach, referred to here as the "business ecosystem model for network security processors", includes a flexible and reconfigurable technology platform, a “keystone” business model for the company that maintains the platform architecture, and an extended ecosystem of companies that both contribute and share in the value created by innovation. New opportunities for business model innovation by participating companies are made possible by the ecosystem model. This ecosystem model builds on: i) the lessons learned from the experience of the first author as a senior integrated circuit architect for providers of public-key cryptography solutions and as the owner of a semiconductor startup, and ii) the latest scholarly research on technology entrepreneurship, business models, platforms, and business ecosystems. This article will be of interest to all technology entrepreneurs, but it will be of particular interest to owners of small companies that provide security solutions and to specialized security professionals seeking to launch their own companies.
topic business ecosystems
business model innovation
commercialization
cybersecurity
platforms
semiconductors
technology entrepreneurship
url http://timreview.ca/sites/default/files/article_PDF/LowMuegge_TIMReview_July2013.pdf
work_keys_str_mv AT arthurlow keystonebusinessmodelsfornetworksecurityprocessors
AT stevenmuegge keystonebusinessmodelsfornetworksecurityprocessors
_version_ 1724741421910458368