exceet Secure Solutions Smart & Secure Network From Vision to Reality
Agenda 1. About exceet 2. Entering the World of Smart Connected Products 3. exceet s Transformation Developing New Competencies 4. M2M & IoT Portfolio exceet Goes Digital and Is Still Learning 9/10/2015 I exceet Secure Solutions I Slide 2
exceet Group at a Glance Technology Group providing development, production and services for intelligent electronics in the Health, Industry and Security markets. The Group combines know-how in development and manufacturing of complex electronic systems and an extensive, long-term expertise in the field of security. In Mill. EUR 2014 Net Sales 185,3 FTE 969 exceet offers solutions for fast-growing markets such as Mobile Security, Mobile Transaction, Body Wearable Electronics and Machine-to-Machine Communication (M2M). Design Development Engineering Production Solutions Services Diagnostic Devices Smart Cards Implants Sensors 9/10/2015 I exceet Secure Solutions I Slide 3
ECMS Berlin, D Design, development, industrialization and series production for high-end complex electronic and electro-optical systems Großbettlingen near Stuttgart, D Design, development and engineering of intelligent control and automation systems Rotkreuz, CH Development and manufacturing of modular platforms of industrial embedded computers Rotkreuz, CH Development and production of medical equipment units, such as blood analysis devices Küssnacht, CH Development and manufacturing of miniaturized printed circuit boards for the medtec industry, e.g. hearing aid implants Ebbs/Tirol, A Development, qualification and series production of medical devices exceet Sites ESS Düsseldorf, D Machine-to-machine communication (M2M), health telematics, e-health solutions, IT security solutions & consulting Zirndorf, D Routers, remote services, light curtains, accident insurance IDMS Groningen, NL Development and production of debit and credit cards Paderborn, D Development & production of debit and credit cards Prachatice, CZ Competence Center for prelaminates used for RFID card components for loyalty and leisure Vienna, A Development and production of card-based loyalty and ID security solutions Unterschleißheim/Munich, D Development and manufacturing of systems solutions in the areas of IT security, payment systems and NFC Kematen/Tirol, A Leading European producer of RFID and plastic cards Bamberg, D Sales Office Loyalty Solutions Bucharest, RO Development Center 9/10/2015 I exceet Secure Solutions I Slide 4 Darmstadt, D Development and sales of card-readers and access-solutions
First Customer Example 9/10/2015 I exceet Secure Solutions I Slide 5
Market Observation 9/10/2015 I exceet Secure Solutions I Slide 6
The Added Value Matters. Technology-Enabled Business» The value of IoT enables new business and new service models» Our customers need to be supported in regard of innovation management» We distinguish between benefits for the groups Machine, Process and Business» Conclusion: Setting up a new discipline value engineering. A new team! 2013 2014 2015 9/10/2015 I exceet Secure Solutions I Slide 7
M2M Benefit Study Common Benefits for Enterprises Experience from IoT-Projects How Can We Learn from Best-Practice? 60 Implemented M2M Projects D-A-CH region 2012-2014 What are the benefits of M2M for SMEs? Are there cross-industry benefits? Can industry sectors learn M2M from each other? Why is M2M a management issue? Key Facts M2M is a driver of new business models and services M2M is becoming a business- and competition-critical factor Decision-makers are hesitant because M2M benefits are not absolutely clear www.m2m-benefit.com, www.m2m-nutzen.de 9/10/2015 I exceet Secure Solutions I Slide 8
M2M Benefit Radar Robust Groups of Benefits exceet Always Focuses on the Value and Helps on the Road to New Business Models or Process Optimizations Machine: Facility, machine, appliance, device, or sensor networked via M2M. User-side benefits. Process: Data exchanges optimize existing processes. User-side benefits. Business: Benefits affecting the competitiveness of an enterprise. Provider-side benefits. www.m2m-benefit.com, www.m2m-nutzen.de 9/10/2015 I exceet Secure Solutions I Slide 9
How does Value Engineering Work? Standardized (efficient & fast) Holistic and interactive Measurable through ROI calculations Visualization benefits & values Tailor-made solutions Weighting: Visualization: Identification of relevant market actors Benefit for market actors Weighting the value Benefit Radar ROI & Solution Approach 1 2 3 4 5 9/10/2015 I exceet Secure Solutions I Slide 10
Connectivity A Challenge in Itself Complexity for Worldwide Operation» A topic typically considered a the end of a project, but how to calculate during the business process?» Enticing proposals a risk with excessive dependency between customers and suppliers» Need for integration from the customer s perspective including devices, connectivity and applications» Conclusion: Integration of multi-carrier platforms are expedient. 2013 2014 2015 9/10/2015 I exceet Secure Solutions I Slide 11
Requirements of Hardware and Sensor Development Hardware and Sensors as the Connection between the Physical and the Digital World» The things are playing a key role in IoT» Product intelligence through sensors» Gateway strategy external or embedded?» Conclusion: Hardware and software development skills are merging! 2013 2014 2015 9/10/2015 I exceet Secure Solutions I Slide 12
Platform and Architecture The Most Stressed Topic at the Beginning of a Project» Platforms with several levels of motivation for several layers» Many platforms are still in an early stage of product development» Key differentiators: scalability & real IT Security» Conclusion: Multi-platform competence is a key competence. 2013 2014 2015 9/10/2015 I exceet Secure Solutions I Slide 13
Security and Compliance The Second Most Important Topic after the Value» Security is more than transport encryption: CyberSecurity & GRC» When data becomes a product, IT security becomes essential» Authentication and identification of individuals, organizations and things» Risk assessments show true protection needs of ecosystems» Conclusion: New solutions are required to secure ecosystems. 2013 2014 2015 9/10/2015 I exceet Secure Solutions I Slide 14
Example gematik gematik was established to create a connected healthcare system in Germany. 2,500 hospitals 200,000 health professionals 70 million insured people 5 billion digital medical records exceet Secure Solutions is supporting gematik in creating one of the largest cryptographically protected networks (Telematics Infrastructure = trusted ecosystem) in the world of the electronic health card (egk). 9/10/2015 I exceet Secure Solutions I Slide 15
360 Security Concept NEW SECURITY SOLUTIONS Required by New Business Models Data Ownership & Privacy Fleet Management Who owns the data? Big Data: challenge & responsibility Driver Insurance Data Protection Confidentiality, integrity, authenticity, availability Workshops Trusted Ecosystem Joint sphere of trust: secure infrastructure & ID management system 9/10/2015 I exceet Secure Solutions I Slide 16
Example Secure Fleet Management Automotive Ecosystem Driver Insurance Workshop Trusted Ecosystem SENSORS INTERFACE GATEWAY + Secure Element PLATFORM Supplier Fleet Operator 9/10/2015 I exceet Secure Solutions I Slide 17
Trusted Ecosystem exceet Trusted Ecosystem The trusted ecosystem s integrated components make it suitable for modular deployment for M2M solutions in any industrial sector. 9/10/2015 I exceet Secure Solutions I Slide 18
Digital Strategy Evolution + Disruption = Digital Strategy 9/10/2015 I exceet Secure Solutions I Slide 19
European 4.0 Transformation Center Aachen 9/10/2015 I exceet Secure Solutions I Slide 20
Transformed Portfolio INNOVATION DEVICE/SENSORS CONNECTIVITY PLATFORM SECURITY COMPLIANCE INTEGRATION Transformation innovation to business for digitized business models Value engineering methodology and -team Hardware optimized for field service Global permission Device test in laboratory environment Multi-carrier platform for global connectivity White-label SIM Global availability / second source Accounting & billing Cloud or on premise (plus location) Business model of the platform providers (openness) Scalability Developing an infrastructure of ECO-systems Trusted Managed Services Digital signatures timestamp GRC Protecting products, processes and environment Data protection, Data security Penetration test Certification ISO 27001, Application integration Visualizing the results Data migration Benefits study Device catalogue Multi-carrier platform Comparison of platforms Secure infrastructure ISMS Implementation COBOX Tableau 9/10/2015 I exceet Secure Solutions I Slide 21
360 Transformation Approach SMART AND SECURE: DEFINE YOU VALUE. TRANSFORM YOUR BUSINESS. 9/10/2015 I exceet Secure Solutions I Slide 22
DIGITAL TRANSFORMATION IN DIALOG From Strategy to Products to Maturity of Companies September 29-30, 2015 I Eurogress Aachen Limited attendance. Register now! 9/10/2015 I exceet Secure Solutions I Slide 23