M2M, IoT & IoE
Asset Tracking: Market Opportunities in the Era of LPWA
Asset tracking solutions have evolved from processing asset tracking data periodically in batches to near-real-time through the integration of hardware, software, and processes. A number of industries have adopted IoT-based asset tracking using Low Power Wide Area (LPWA) Network connectivity technologies to derive valuable insights to deliver more efficient operations.
This report analyzes the asset tracking market, which includes location tracking of stationary or slow-moving assets. This analysis includes asset tracking solutions where location tracking as an application is the entry point for solution providers to offer other value-added monitoring of environmental conditions, such as light, temperature, humidity, pressure, altitude, etc.
The report introduces different connectivity technologies which includes both short-range wireless and Wide area network technologies but focuses on Low-Power Wide-Area (LPWA) network technologies that are seen as popular WAN connectivity choices to connect battery powered sensor devices used for geolocation and asset tracking solutions.Continue
Reports & Data
Despite the Challenges Ahead, It Falls on Government to Adopt a Three-Pronged Strategy to Improve IoT Security
Limited security specifications in IoT devices signal a market failure that has long required regulatory intervention. As long as built-in security features, such as secure code updates and authentication protocols, have not become a legal requirement, IoT vendors have been able to avoid implementing expensive security features. However, in 2018, the IoT sector, including device manufacturers and software vendors, witnessed a sea change in how government viewed its regulation of disruptive technologies. Regulation of IoT security occurred at the state level in the US and at the supranational level in the EU. What’s more, a voluntary national IoT code of practice was introduced in the UK. Overriding all this is a transformative change in the way vendors view government IoT regulation. Following growing consumer awareness of data privacy after the introduction of the EU’s GDPR (General Data Protection Regulation) and the purported use of tampered hardware in Chinese originated devices for government espionage purposes, vendors may now be starting to view government led regulation as more of an opportunity than on obstacle.
Vodafone has been an aggressive operator in the B2B IoT market, mostly driven by its heritage in DSL/fiber infrastructure, unified communications, and mobile networks. In addition, the enterprise emphasis also comes about due to its international mobile network footprint spanning countries with a large business base of customers and significant business activity, including the United Kingdom, Germany, and India. But a review of Vodafone’s IoT strategy based on information provided by its recent analyst event suggests that it is de-emphasizing the middle of the IoT value chain and placing greater emphasis on its own cloud services. This is interesting, but also risky!
Every client is assigned a key member of our research team, based on their organization’s needs and goals. And, an unlimited number of Analyst Inquiry calls are available to answer your specific questions.
As connected Things are expected to exceed 50 billion within the next few years it would seem that traditional Identity and Access Management models cannot fully grasp the potential of the IoT era. Communication, data exchange, device management and security are not addressed holistically by existing frameworks leaving companies with less-than-optimal IoT strategies and proving to be a serious threat to existing cloud-based investments.
Through this presentation, ABI Research aims to provide the audience with an examination of role of identity for enhancing IoT solution enablement followed by the introduction of the next evolutionary stage for the Identity of Things: the realization of the IAM 2.0. The framework suggests that both existing and emerging industry players should learn to address the demands of the IDoT in a comprehensive manner by embracing a wider spectrum of technologies which escapes the confines of API design and PKI encryption.
- This webinar will address the following five questions:
- Why is the Identity of Things important for the IoT?
- How can companies tackle Thing identity and management services?
- What to expect from the industry’s transition towards IAM 2.0?
- Which markets will be the first to evolve under this transformative paradigm?
- What are the most important aspects for enabling secure IoT services?
ABI Research’s MWC 2019 ‘Reality Check’ Whitepaper Highlights ‘Anxiety’ and Transformative Technologies
ABI Research’s March 13 Webinar Identifies Top Industrial Technologies to Watch for at Hannover Messe 2019
Analytics and Applications Driving Growth in Automotive, Robotics and IoT Markets
Fourfold Growth in IoT Service Revenues to be Spearheaded by Data and Analytics
Growth Opportunities Identified in M2M, 5G, and Digital Factory Markets