Subscribe M2M, IoT & IoE

ABI Research’s M2M, IoT & IoE analysis provides a 360-degree view of the IoT value chain across devices, connectivity, and services. Our research uncovers emerging trends and predictions for market growth across big data/analytics in IoT platforms as cloud and analytics services relate to IoT data ingestion and streaming, storage, integration, and visualization. We explore go-to-market strategies and leading business models expected to transform IoT product and service consumptions, as well as internal organizational structures and partner relationships.

Featured Research


U.S. Network Operator M2M Market Analysis: Verizon, AT&T, Sprint, and T-Mobile

The US Market for Cellular M2M connections is experiencing growth in multiple industry segments, competition from new providers with LPWA technologies while also transitioning to new Lte based standards for IoT. New competitors and alliances are forming, offering a variety of solutions and alternative options. The operators are exhibiting a variety of strategies to on-board new IoT applications with promotions for rate-plans, platforms, support services, as well as subsidies.


Reports & Data


Executive Foresights

Telco’s M2M Services Need Defense Options Against Hacked IoT Devices

1Q 2018

Telcos have introduced machine-to-machine (M2M) rate plans to attract new Internet of things (IoT) applications based on low monthly fees around low per-node traffic expectations. However, a consequence of a targeted distributed denial of service (DDoS) attack being implemented on hacked IoT devices is that it can create a surge in message traffic that compromises both telcos’ capacity to support subscription clients and consumes the host victim device’s bandwidth. The typical IoT use case of a constrained device with a carefully designed power management for a long expected life cycle may have the battery drained in generating the hacker’s messages. So, the IoT device victim will face a compromised devices as well as potential service fees in addition to the disruption caused to the actual target victim.


Vodafone B2B IoT Strategy: Heavy on the Ends, Light in the Middle

1Q 2018

Vodafone has been an aggressive operator in the B2B IoT market, mostly driven by its heritage in DSL/fiber infrastructure, unified communications, and mobile networks. In addition, the enterprise emphasis also comes about due to its international mobile network footprint spanning countries with a large business base of customers and significant business activity, including the United Kingdom, Germany, and India. But a review of Vodafone’s IoT strategy based on information provided by its recent analyst event suggests that it is de-emphasizing the middle of the IoT value chain and placing greater emphasis on its own cloud services. This is interesting, but also risky!

Analyst Support

Every client is assigned a key member of our research team, based on their organization’s needs and goals. And, an unlimited number of Analyst Inquiry calls are available to answer your specific questions.

Dan Shey

Vice President, Enabling Platforms

Michela Menting

Research Director

Ryan Martin

Principal Analyst

Adarsh Krishnan

Senior Analyst

Dimitrios Pavlakis

Industry Analyst

Ryan Harbison

Research Analyst

Kevin McDermott

Principal Analyst

Jamie Moss

Research Director

Jake Saunders

Vice President, Asia-Pacific & Advisory Services

Malik Saadi

Vice President, Strategic Technologies


Identity of Things - Rethinking IoT Platform Services as Connections Exceed 50 Billion

March 22, 2018, 2 p.m.

As connected Things are expected to exceed 50 billion within the next few years it would seem that traditional Identity and Access Management models cannot fully grasp the potential of the IoT era. Communication, data exchange, device management and security are not addressed holistically by existing frameworks leaving companies with less-than-optimal IoT strategies and proving to be a serious threat to existing cloud-based investments.

Through this presentation, ABI Research aims to provide the audience with an examination of role of identity for enhancing IoT solution enablement followed by the introduction of the next evolutionary stage for the Identity of Things: the realization of the IAM 2.0. The framework suggests that both existing and emerging industry players should learn to address the demands of the IDoT in a comprehensive manner by embracing a wider spectrum of technologies which escapes the confines of API design and PKI encryption.

    This webinar will address the following five questions:
  • Why is the Identity of Things important for the IoT?
  • How can companies tackle Thing identity and management services?
  • What to expect from the industry’s transition towards IAM 2.0?
  • Which markets will be the first to evolve under this transformative paradigm?
  • What are the most important aspects for enabling secure IoT services?