exceet Secure Solutions Smart & Secure Network From Vision to Reality

Similar documents
Unleashing the Power of the Internet of Things

ITU WORK ON INTERNET OF THINGS

2015 Canadian Cellular M2M and IoT Market Leadership Award

Research Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era

Internet of Things markets

MIT M2M ZU INDUSTRIE 4.0

SOLUTIONS FOR HEALTHCARE PROFESSIONALS AND GOVERNMENTS

Towards a Thriving Data Economy: Open Data, Big Data, and Data Ecosystems

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

Investor and Analyst Call

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC

T r a n s f o r m i ng Manufacturing w ith the I n t e r n e t o f Things

TELIT Enabling IoT Solutions Boban Vukicevic SLIDE 1

DON T LET YOUR FLEET TELEMATICS SOLUTION GO DARK Navigating the Upcoming AT&T 2G Shutdown

Enabling Manufacturing Transformation in a Connected World. John Shewchuk Technical Fellow DX

How To Get Smart Cards From Atos

FWD. What the Internet of Things will mean for business

M2M & Internet of Things Opportunities

Harnessing the Data Flood: Oracle s Visionary Platform from Device to Data Center. Chris Baker Senior Vice President Worldwide ISV/OEM Java Sales

Securing the Growth of IoT and M2M

BARC Big Data Use Cases Survey 2015 First results and insights

CONECTIVIDAD EN LA ERA DEL IOT THE INTERNET OF THINGS

How to leverage SAP HANA for fast ROI and business advantage 5 STEPS. to success. with SAP HANA. Unleashing the value of HANA

Mobile Payment: The next step of secure payment VDI / VDE-Colloquium. Hans-Jörg Frey Senior Product Manager May 16th, 2013

A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies. November 2014

Evolving operator roles. How the Internet of Things can create innovative solutions that support society

CINTERION The global leader in cellular M2M communication. Cinterion Wireless Modules GmbH 2011, All rights reserved

MEPTEC. Ecosystem for MCU, Sensors and MEMS for IoT Tony Massimini Chief of Technology Semico Research Corp. May 20, 2015

M2M and the IT Infrastructure

A UNIVERSAL MACHINE FOR THE INDUSTRIAL INTERNET OF THINGS. MultiConnect Conduit

3 Myths about IoT in Logistics

ARM mbed IoT Device Platform. November 3 rd, 2014

Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices

PKI: THE SECURITY SOLUTION FOR THE INTERNET OF THINGS

M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept.

NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China

M2M. In an IoT World. Whitepaper.

liberate unify and secure your enterprise communications A3C Anytime Communication & Collaboration Cloud

SMARTRAC TECHNOLOGY GROUP ALL RIGHTS RESERVED

IoT Solutions for Upstream Oil and Gas

Short-range Low Power Wireless Devices and Internet of Things (IoT)

Business models in the Internet of Things. Miriam Cordero Head of Strategy - BT

INTERNET OF THINGS: SCIENCE FICTION OR BUSINESS FACT?

Internet of things How to drive innovation in your business. Patrick Pax Business Development M2M Solutions and Communication Enabled Applications

Realizing the Big Data potential - from data to business intelligence

Maintain Fleet Management Solutions Using Wide Area Wireless Technology

How To Understand The Power Of The Internet Of Things

Internet of Things: Consumerisation of Technology.

Enterprise Application Enablement for the Internet of Things

Accenture and Oracle: Leading the IoT Revolution

Technical Innovations

Preemptive security solutions for healthcare

DAY 1 MONDAY, SEPT

December, 7th, 2015, Assises de l Embarqué

Analytics In the Cloud

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

M 2 M IWG. Eclipse, M2M and the Internet of Things. Overview. M 2 M Industry WorkGroup! M2M?

Blueprints and feasibility studies for Enterprise IoT (Part Two of Three)

Solutions. Machine-to-Machine. Arrow Electronics. Complete, end-to-end solutions over the life of your product.

Cellular Wireless technology: Creating a link between people and the healthcare community

IOT & Applications of Big Data

Capitalizing on the Internet of Things (IoT)

Nokia Siemens Networks Cumulocity The key to the world of machine-to-machine opportunity

IoT Prospects of Worldwide Development and Current Global Circumstances

Technology offer: Machine-to-Cloud Management System of Distributed Heterogeneous Devices

IoT: New Opportunities for Semiconductor Industry Growth. Andrew C. Russell Vice President Marketing Greater China

INTRODUCTION. IoT AND IP STRATEGIES

Defending the Internet of Things

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M

Connected Operations. The internet of things, people and services. Overview. The Market. OPC Opportunity Q&A

Internet of Things Driving a Revolutionary Business Model For the Next Generation Embedded Market

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

System Security Solutions for the connected world.

BOOST YOUR BUSINESS WITH M2M TECHNOLOGY

Java and the Internet of Things

Internet of Things: What is going to change in our lives

Bellevue University Cybersecurity Programs & Courses

WL Connected Living solutions. unlock. the power of IoT through. engaging Connected Services

Reimagining Business with SAP HANA Cloud Platform for the Internet of Things

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

The Internet of Things (IoT)

Agriculture Embracing

The Bosch IoT Suite

Transcription:

exceet Secure Solutions Smart & Secure Network From Vision to Reality

Agenda 1. About exceet 2. Entering the World of Smart Connected Products 3. exceet s Transformation Developing New Competencies 4. M2M & IoT Portfolio exceet Goes Digital and Is Still Learning 9/10/2015 I exceet Secure Solutions I Slide 2

exceet Group at a Glance Technology Group providing development, production and services for intelligent electronics in the Health, Industry and Security markets. The Group combines know-how in development and manufacturing of complex electronic systems and an extensive, long-term expertise in the field of security. In Mill. EUR 2014 Net Sales 185,3 FTE 969 exceet offers solutions for fast-growing markets such as Mobile Security, Mobile Transaction, Body Wearable Electronics and Machine-to-Machine Communication (M2M). Design Development Engineering Production Solutions Services Diagnostic Devices Smart Cards Implants Sensors 9/10/2015 I exceet Secure Solutions I Slide 3

ECMS Berlin, D Design, development, industrialization and series production for high-end complex electronic and electro-optical systems Großbettlingen near Stuttgart, D Design, development and engineering of intelligent control and automation systems Rotkreuz, CH Development and manufacturing of modular platforms of industrial embedded computers Rotkreuz, CH Development and production of medical equipment units, such as blood analysis devices Küssnacht, CH Development and manufacturing of miniaturized printed circuit boards for the medtec industry, e.g. hearing aid implants Ebbs/Tirol, A Development, qualification and series production of medical devices exceet Sites ESS Düsseldorf, D Machine-to-machine communication (M2M), health telematics, e-health solutions, IT security solutions & consulting Zirndorf, D Routers, remote services, light curtains, accident insurance IDMS Groningen, NL Development and production of debit and credit cards Paderborn, D Development & production of debit and credit cards Prachatice, CZ Competence Center for prelaminates used for RFID card components for loyalty and leisure Vienna, A Development and production of card-based loyalty and ID security solutions Unterschleißheim/Munich, D Development and manufacturing of systems solutions in the areas of IT security, payment systems and NFC Kematen/Tirol, A Leading European producer of RFID and plastic cards Bamberg, D Sales Office Loyalty Solutions Bucharest, RO Development Center 9/10/2015 I exceet Secure Solutions I Slide 4 Darmstadt, D Development and sales of card-readers and access-solutions

First Customer Example 9/10/2015 I exceet Secure Solutions I Slide 5

Market Observation 9/10/2015 I exceet Secure Solutions I Slide 6

The Added Value Matters. Technology-Enabled Business» The value of IoT enables new business and new service models» Our customers need to be supported in regard of innovation management» We distinguish between benefits for the groups Machine, Process and Business» Conclusion: Setting up a new discipline value engineering. A new team! 2013 2014 2015 9/10/2015 I exceet Secure Solutions I Slide 7

M2M Benefit Study Common Benefits for Enterprises Experience from IoT-Projects How Can We Learn from Best-Practice? 60 Implemented M2M Projects D-A-CH region 2012-2014 What are the benefits of M2M for SMEs? Are there cross-industry benefits? Can industry sectors learn M2M from each other? Why is M2M a management issue? Key Facts M2M is a driver of new business models and services M2M is becoming a business- and competition-critical factor Decision-makers are hesitant because M2M benefits are not absolutely clear www.m2m-benefit.com, www.m2m-nutzen.de 9/10/2015 I exceet Secure Solutions I Slide 8

M2M Benefit Radar Robust Groups of Benefits exceet Always Focuses on the Value and Helps on the Road to New Business Models or Process Optimizations Machine: Facility, machine, appliance, device, or sensor networked via M2M. User-side benefits. Process: Data exchanges optimize existing processes. User-side benefits. Business: Benefits affecting the competitiveness of an enterprise. Provider-side benefits. www.m2m-benefit.com, www.m2m-nutzen.de 9/10/2015 I exceet Secure Solutions I Slide 9

How does Value Engineering Work? Standardized (efficient & fast) Holistic and interactive Measurable through ROI calculations Visualization benefits & values Tailor-made solutions Weighting: Visualization: Identification of relevant market actors Benefit for market actors Weighting the value Benefit Radar ROI & Solution Approach 1 2 3 4 5 9/10/2015 I exceet Secure Solutions I Slide 10

Connectivity A Challenge in Itself Complexity for Worldwide Operation» A topic typically considered a the end of a project, but how to calculate during the business process?» Enticing proposals a risk with excessive dependency between customers and suppliers» Need for integration from the customer s perspective including devices, connectivity and applications» Conclusion: Integration of multi-carrier platforms are expedient. 2013 2014 2015 9/10/2015 I exceet Secure Solutions I Slide 11

Requirements of Hardware and Sensor Development Hardware and Sensors as the Connection between the Physical and the Digital World» The things are playing a key role in IoT» Product intelligence through sensors» Gateway strategy external or embedded?» Conclusion: Hardware and software development skills are merging! 2013 2014 2015 9/10/2015 I exceet Secure Solutions I Slide 12

Platform and Architecture The Most Stressed Topic at the Beginning of a Project» Platforms with several levels of motivation for several layers» Many platforms are still in an early stage of product development» Key differentiators: scalability & real IT Security» Conclusion: Multi-platform competence is a key competence. 2013 2014 2015 9/10/2015 I exceet Secure Solutions I Slide 13

Security and Compliance The Second Most Important Topic after the Value» Security is more than transport encryption: CyberSecurity & GRC» When data becomes a product, IT security becomes essential» Authentication and identification of individuals, organizations and things» Risk assessments show true protection needs of ecosystems» Conclusion: New solutions are required to secure ecosystems. 2013 2014 2015 9/10/2015 I exceet Secure Solutions I Slide 14

Example gematik gematik was established to create a connected healthcare system in Germany. 2,500 hospitals 200,000 health professionals 70 million insured people 5 billion digital medical records exceet Secure Solutions is supporting gematik in creating one of the largest cryptographically protected networks (Telematics Infrastructure = trusted ecosystem) in the world of the electronic health card (egk). 9/10/2015 I exceet Secure Solutions I Slide 15

360 Security Concept NEW SECURITY SOLUTIONS Required by New Business Models Data Ownership & Privacy Fleet Management Who owns the data? Big Data: challenge & responsibility Driver Insurance Data Protection Confidentiality, integrity, authenticity, availability Workshops Trusted Ecosystem Joint sphere of trust: secure infrastructure & ID management system 9/10/2015 I exceet Secure Solutions I Slide 16

Example Secure Fleet Management Automotive Ecosystem Driver Insurance Workshop Trusted Ecosystem SENSORS INTERFACE GATEWAY + Secure Element PLATFORM Supplier Fleet Operator 9/10/2015 I exceet Secure Solutions I Slide 17

Trusted Ecosystem exceet Trusted Ecosystem The trusted ecosystem s integrated components make it suitable for modular deployment for M2M solutions in any industrial sector. 9/10/2015 I exceet Secure Solutions I Slide 18

Digital Strategy Evolution + Disruption = Digital Strategy 9/10/2015 I exceet Secure Solutions I Slide 19

European 4.0 Transformation Center Aachen 9/10/2015 I exceet Secure Solutions I Slide 20

Transformed Portfolio INNOVATION DEVICE/SENSORS CONNECTIVITY PLATFORM SECURITY COMPLIANCE INTEGRATION Transformation innovation to business for digitized business models Value engineering methodology and -team Hardware optimized for field service Global permission Device test in laboratory environment Multi-carrier platform for global connectivity White-label SIM Global availability / second source Accounting & billing Cloud or on premise (plus location) Business model of the platform providers (openness) Scalability Developing an infrastructure of ECO-systems Trusted Managed Services Digital signatures timestamp GRC Protecting products, processes and environment Data protection, Data security Penetration test Certification ISO 27001, Application integration Visualizing the results Data migration Benefits study Device catalogue Multi-carrier platform Comparison of platforms Secure infrastructure ISMS Implementation COBOX Tableau 9/10/2015 I exceet Secure Solutions I Slide 21

360 Transformation Approach SMART AND SECURE: DEFINE YOU VALUE. TRANSFORM YOUR BUSINESS. 9/10/2015 I exceet Secure Solutions I Slide 22

DIGITAL TRANSFORMATION IN DIALOG From Strategy to Products to Maturity of Companies September 29-30, 2015 I Eurogress Aachen Limited attendance. Register now! 9/10/2015 I exceet Secure Solutions I Slide 23