Surpassing challenges of M2M
Jose Rabello
M2M Solution Sales Manager LATAM
March 2013
AGENDA
Gemalto Outlook
M2M Market Overview
Module Business Technology Path
Field Robustness
Device Management
M2M in the Cloud
Remote Personalization
Security for M2M
2
GEMALTO OUTLOOK
M2M Services - Confidential
3
3 Main Divisions
Telecom
Mobile operators
M2M players
SECURE
TRANSACTIONS
Banks
Security &
Government
Government
M2M MARKET
OVERVIEW
M2M Services - Confidential
5
Exploding numbers in the coming years
Aftermarket
Telematics
Security
Short term - automotive and
fleet management
Payment
Medium term – utilities:
Metering
2015: 300 million connections
Remote
Maintenance
and Control
2020: 2.1 billion connections
Environmental
Monitoring
OEM Telematics
WLL/
RouterGateway
Industrial
Computing
Health Care
M2M Services - Confidential
6
Promotion of smooth transition between technologies
TECHNOLOGY PATH
M2M Services - Confidential
7
…promote device compatibility between
technologies aiming to lower development costs
LTE
3G
2G
M2M Services - Confidential
8
Improving Quality of Services
ROBUSTNESS
IN THE FIELD
M2M Services - Confidential
9
M2M specific needs: Longer life, resistance to
higher constraints & predictability
• Outdoor
 Longer life span
 Resist to larger temperatures range
• Cold
 Resist to vibrations, shocks, humidity
• Heat
 Full integration to allow simplified
and transparent logistics
• Rain
 Limit the usage to M2M only - Anti
theft / Anti Fraud
• Sun
Completed by:
• Vibration
 Liability requirements
 SLA where best effort is not enough
 Key Performance Indicators
M2M Services - Confidential
10
Enabling services Carriers and M2M customers
DEVICE MANAGEMENT
M2M Services - Confidential
11
Remote Device Management
M2M Services - Confidential
12
Providing developers’ an easier way to create
M2M CLOUD SERVICES
M2M Services - Confidential
13
Deliver More Apps, Faster
Attract more developers to their network
Enable more sophisticated applications
Accelerate time to market
Accelerate time to volume
More M2M contracts sooner
Start
Deploy
Deliver M2M apps in 6 months
instead of 18!
Accelerates time-to-market & time-to-revenue
M2M Services - Confidential
Late Stage Personalization and eUICC management
FLEXIBLE
PERSONALIZATION
M2M Services - Confidential
15
Subscription Manager at a glance…
SIM
Vendor
Mobile Operator A
HW Integrator
Mobile Operator B
M2M Application
Service Provider
Remote
Provisioning
System
Mobile Operator Z
M2M Services - Confidential
16
Protect your devices from hackers
SECURITY
M2M Services - Confidential
17
Security: needs to be End to End
DISTRIBUTING security counter-measure across
 INFRASTRUCTURE
 DEVICES
 PEOPLE
Data privacy
-Network security
Encryption
User
authentication
Identity
Data privacy
eSE/eUICC
Secure
element
M2M Services - Confidential
Thank you
[email protected]
Download

Security