Subscribe M2M, IoT & IoE
U.S. Network Operator M2M Market Analysis: Verizon, AT&T, Sprint, and T-Mobile
The US Market for Cellular M2M connections is experiencing growth in multiple industry segments, competition from new providers with LPWA technologies while also transitioning to new Lte based standards for IoT. New competitors and alliances are forming, offering a variety of solutions and alternative options. The operators are exhibiting a variety of strategies to on-board new IoT applications with promotions for rate-plans, platforms, support services, as well as subsidies.Continue
Reports & Data
Telcos have introduced machine-to-machine (M2M) rate plans to attract new Internet of things (IoT) applications based on low monthly fees around low per-node traffic expectations. However, a consequence of a targeted distributed denial of service (DDoS) attack being implemented on hacked IoT devices is that it can create a surge in message traffic that compromises both telcos’ capacity to support subscription clients and consumes the host victim device’s bandwidth. The typical IoT use case of a constrained device with a carefully designed power management for a long expected life cycle may have the battery drained in generating the hacker’s messages. So, the IoT device victim will face a compromised devices as well as potential service fees in addition to the disruption caused to the actual target victim.
Vodafone has been an aggressive operator in the B2B IoT market, mostly driven by its heritage in DSL/fiber infrastructure, unified communications, and mobile networks. In addition, the enterprise emphasis also comes about due to its international mobile network footprint spanning countries with a large business base of customers and significant business activity, including the United Kingdom, Germany, and India. But a review of Vodafone’s IoT strategy based on information provided by its recent analyst event suggests that it is de-emphasizing the middle of the IoT value chain and placing greater emphasis on its own cloud services. This is interesting, but also risky!
Every client is assigned a key member of our research team, based on their organization’s needs and goals. And, an unlimited number of Analyst Inquiry calls are available to answer your specific questions.
March 22, 2018, 2 p.m.
As connected Things are expected to exceed 50 billion within the next few years it would seem that traditional Identity and Access Management models cannot fully grasp the potential of the IoT era. Communication, data exchange, device management and security are not addressed holistically by existing frameworks leaving companies with less-than-optimal IoT strategies and proving to be a serious threat to existing cloud-based investments.
Through this presentation, ABI Research aims to provide the audience with an examination of role of identity for enhancing IoT solution enablement followed by the introduction of the next evolutionary stage for the Identity of Things: the realization of the IAM 2.0. The framework suggests that both existing and emerging industry players should learn to address the demands of the IDoT in a comprehensive manner by embracing a wider spectrum of technologies which escapes the confines of API design and PKI encryption.
- This webinar will address the following five questions:
- Why is the Identity of Things important for the IoT?
- How can companies tackle Thing identity and management services?
- What to expect from the industry’s transition towards IAM 2.0?
- Which markets will be the first to evolve under this transformative paradigm?
- What are the most important aspects for enabling secure IoT services?
ABI Research’s New ‘Executive Foresights’ Focus on Real-World Triggers
ABI Research Announces Transformative Technologies Webinar Series
13 ABI Research Analysts to Provide Strategic Guidance About Transformative Technologies to Mobile World Congress 2018 Attendees
What Visionaries Should Have Learned at CES 2018
The Top Eight Questions End-Users Need to Ask to Build a Successful IoT GTM Strategy