Keystone Business Models for Network Security Processors
Network security processors are critical components of high-performance systems built for cybersecurity. Development of a network security processor requires multi-domain experience in semiconductors and complex software security applications, and multiple iterations of both software and hardware im...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Carleton University
2013-07-01
|
Series: | Technology Innovation Management Review |
Subjects: | |
Online Access: | http://timreview.ca/sites/default/files/article_PDF/LowMuegge_TIMReview_July2013.pdf |
id |
doaj-a7e15ec1aede4cfba2cbe7942a692eba |
---|---|
record_format |
Article |
spelling |
doaj-a7e15ec1aede4cfba2cbe7942a692eba2020-11-25T02:49:55ZengCarleton UniversityTechnology Innovation Management Review1927-03212013-07-01July 2013: Cybersecurity2533Keystone Business Models for Network Security ProcessorsArthur LowSteven MueggeNetwork security processors are critical components of high-performance systems built for cybersecurity. Development of a network security processor requires multi-domain experience in semiconductors and complex software security applications, and multiple iterations of both software and hardware implementations. Limited by the business models in use today, such an arduous task can be undertaken only by large incumbent companies and government organizations. Neither the “fabless semiconductor” models nor the silicon intellectual-property licensing (“IP-licensing”) models allow small technology companies to successfully compete. This article describes an alternative approach that produces an ongoing stream of novel network security processors for niche markets through continuous innovation by both large and small companies. This approach, referred to here as the "business ecosystem model for network security processors", includes a flexible and reconfigurable technology platform, a “keystone” business model for the company that maintains the platform architecture, and an extended ecosystem of companies that both contribute and share in the value created by innovation. New opportunities for business model innovation by participating companies are made possible by the ecosystem model. This ecosystem model builds on: i) the lessons learned from the experience of the first author as a senior integrated circuit architect for providers of public-key cryptography solutions and as the owner of a semiconductor startup, and ii) the latest scholarly research on technology entrepreneurship, business models, platforms, and business ecosystems. This article will be of interest to all technology entrepreneurs, but it will be of particular interest to owners of small companies that provide security solutions and to specialized security professionals seeking to launch their own companies. http://timreview.ca/sites/default/files/article_PDF/LowMuegge_TIMReview_July2013.pdfbusiness ecosystemsbusiness model innovationcommercializationcybersecurityplatformssemiconductorstechnology entrepreneurship |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Arthur Low Steven Muegge |
spellingShingle |
Arthur Low Steven Muegge Keystone Business Models for Network Security Processors Technology Innovation Management Review business ecosystems business model innovation commercialization cybersecurity platforms semiconductors technology entrepreneurship |
author_facet |
Arthur Low Steven Muegge |
author_sort |
Arthur Low |
title |
Keystone Business Models for Network Security Processors |
title_short |
Keystone Business Models for Network Security Processors |
title_full |
Keystone Business Models for Network Security Processors |
title_fullStr |
Keystone Business Models for Network Security Processors |
title_full_unstemmed |
Keystone Business Models for Network Security Processors |
title_sort |
keystone business models for network security processors |
publisher |
Carleton University |
series |
Technology Innovation Management Review |
issn |
1927-0321 |
publishDate |
2013-07-01 |
description |
Network security processors are critical components of high-performance systems built for cybersecurity. Development of a network security processor requires multi-domain experience in semiconductors and complex software security applications, and multiple iterations of both software and hardware implementations. Limited by the business models in use today, such an arduous task can be undertaken only by large incumbent companies and government organizations. Neither the “fabless semiconductor” models nor the silicon intellectual-property licensing (“IP-licensing”) models allow small technology companies to successfully compete. This article describes an alternative approach that produces an ongoing stream of novel network security processors for niche markets through continuous innovation by both large and small companies. This approach, referred to here as the "business ecosystem model for network security processors", includes a flexible and reconfigurable technology platform, a “keystone” business model for the company that maintains the platform architecture, and an extended ecosystem of companies that both contribute and share in the value created by innovation. New opportunities for business model innovation by participating companies are made possible by the ecosystem model. This ecosystem model builds on: i) the lessons learned from the experience of the first author as a senior integrated circuit architect for providers of public-key cryptography solutions and as the owner of a semiconductor startup, and ii) the latest scholarly research on technology entrepreneurship, business models, platforms, and business ecosystems. This article will be of interest to all technology entrepreneurs, but it will be of particular interest to owners of small companies that provide security solutions and to specialized security professionals seeking to launch their own companies. |
topic |
business ecosystems business model innovation commercialization cybersecurity platforms semiconductors technology entrepreneurship |
url |
http://timreview.ca/sites/default/files/article_PDF/LowMuegge_TIMReview_July2013.pdf |
work_keys_str_mv |
AT arthurlow keystonebusinessmodelsfornetworksecurityprocessors AT stevenmuegge keystonebusinessmodelsfornetworksecurityprocessors |
_version_ |
1724741421910458368 |