OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

Similar documents
IDENTITY SOLUTIONS END-TO-END SYSTEMS SOLUTIONS TO PROTECT IDENTITIES AND SECURE ACCESS FOR A MOBILITY WORLD

OT PRODUCTS & SOLUTIONS TRANSPORT

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M

OT PRODUCTS AND SOLUTIONS EMV-IN-A-BOX

The Importance of Secure Elements in M2M Deployments: An Introduction

esim for consumer devices MWC 2016 Telefonica S.A. Feb. 2016

IOT for Automotive and Transport Challenges and Opportunities

Research Priorities Jean-Pierre Tual, Industrial Relations Director, Strategy and Innovation

FWD. What the Internet of Things will mean for business

Unleashing the Power of the Internet of Things

CINTERION The global leader in cellular M2M communication. Cinterion Wireless Modules GmbH 2011, All rights reserved

ACI TOKEN MANAGER FOR MOBILE: TOKEN SERVICE PROVISION, HCE AND EMBEDDED SECURE ELEMENT IN THE CLOUD

Securing the Growth of IoT and M2M

YOUR GLOBAL M2M PARTNER

M2M without Borders. Why esim is a Game Changer for the International Internet of Things

Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era

Oberthur Technologies. A Technology Leader

TELIT Enabling IoT Solutions Boban Vukicevic SLIDE 1

The new role of billing systems in the Internet of Things

Machina Research Viewpoint. The critical role of connectivity platforms in M2M and IoT application enablement

Global M2M Platform vodacom.co.za/business

CORPORATE BROCHURE. Trust. Every day

Transaction Security. Training Academy

Maintain Fleet Management Solutions Using Wide Area Wireless Technology

M2M Solutions. Jose Rabello M2M Solution Sales Manager LATAM Gemalto Telecom Forum 2013

Machine to Machine Communications As a Service

Increasing M2M device intelligence drive fast decisions and help new business

Accenture and Oracle: Leading the IoT Revolution

Secure Authentication for the Development of Mobile Internet Services Critical Considerations

Benefits Analysis of GSMA Embedded SIM Specification on the Mobile Enabled M2M Industry

A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies. November 2014

INTRODUCTION AND HISTORY

Training. MIFARE4Mobile. Public. MobileKnowledge April 2015

Realizing the Big Data potential - from data to business intelligence

Security in Vehicle Networks

Cyber Security: Confronting the Threat

Verizon Applications and Cloud

M2M Connectivity T: W:

The Role of the Trusted Service Manager in Mobile Commerce

Mobilizing Business Applications, Efficiently and Affordably

M2M. In an IoT World. Whitepaper.

In the pursuit of becoming smart

Strengthen security with intelligent identity and access management

M2M innovations that will drive the market: Big Data, Cloud and LTE technologies impact?

Guiding principles for security in a networked society

The Internet of Things: Opportunities & Challenges

CHINA UNICOM COMMIT TO MAKE CONNECTED LIVING EASIER

A Secure and Open Solution for Seamless Transit Systems

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

IoT is an opportunity for the foundation of new businesses in the future connected society.

2015 Canadian Cellular M2M and IoT Market Leadership Award

Automotive Companies Save Costs, Gain Advantages with Red Bend s FOTA. Case Study

Improve the product lifecycle

Executive Summary. Page 2 of 12

Mobile MasterCard PayPass Testing and Approval Guide. December Version 2.0

Best Practices for the Use of RF-Enabled Technology in Identity Management. January Developed by: Smart Card Alliance Identity Council

Credential Management for Cloud Computing

Industry 4.0: Cyber-Security Challenges on the Horizon

Enterprise Application Enablement for the Internet of Things

Harnessing the Mobile Evolution. Shiraz Hasan Sr. Director M2M & Mobile Applications AT&T Business Solutions

Collateral Management Systems: The Benefits of Deploying for Vehicle Finance.

Best Practices for Implementing Global IoT Initiatives Key Considerations for Launching a Connected Devices Service

Embedded Java & Secure Element for high security in IoT systems

SmartCITIES. Smart InterOperable. Solutions for Transport Authorities

The Internet of Things (IoT) Opportunities and Risks

Sierra Wireless Corporate Overview. February 2015

Bringing Security & Interoperability to Mobile Transactions. Critical Considerations

BOOST YOUR BUSINESS WITH M2M TECHNOLOGY

THE CONNECTED WORKPLACE A strategy for making the most of mobile devices while protecting your enterprise.

Nokia Networks. security you can rely on

Automotive Suppliers and Cybersecurity

What is Internet of Things?

Provide access control with innovative solutions from IBM.

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

Mobile Financial Services

Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy.

Catch all the digital moments

TeliaSonera Global M2M Services

Mobile Payments: The Market for Travelers, Unbanked, and No/Low Credit Users

Executive Summary P 1. ActivIdentity

Infineon Chip Card & Security Security for the connected world

Infineon Security Partner Network

Making Cloud-Based Mobile Payments a Reality with Digital Issuance, Tokenization, and HCE WHITE PAPER

December 2013 Copyright 2013 GSM Association

Opinion and recommendations on challenges raised by biometric developments

Defending the Internet of Things

MACHINE-TO-MACHINE (M2M) THE 4 TH INDUSTRIAL REVOLUTION?

SIMPLIFYING AND AUTOMATING MANAGEMENT ACROSS VIRTUALIZED/CLOUD-BASED INFRASTRUCTURES

WHITEPAPER BEST PRACTICES

Transcription:

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT, CONNECTED DEVICES TO REDUCE OPERATIONAL COSTS, IMPROVE USABILITY AND TACKLE THE CHALLENGE OF SUSTAINABLE DEVELOPMENT: CARS ARE TRANSFORMED WITH TELEMATICS, INFOTAINMENT AND EMERGENCY CALL SERVICES, INCREASING THE SAFETY AND CONVENIENCE FOR DRIVERS AND PASSENGERS. AS THE WORLD IS HEADING TOWARD CLEANER AND MORE EFFICIENT ENERGY USE, ADVANCED METERING INFRASTRUCTURES ARE BEING INCREASINGLY CONNECTED TO CELLULAR NETWORKS. CONNECTED CONSUMER ELECTRONIC DEVICES ARE ALSO FLOURISHING, TRANSFORMING THE CONSUMER EXPERIENCE AND HOW THE DEVICES ARE USED FOR EXAMPLE WEARABLES LIKE CONNECTED WATCHES AND GLASSES. BUILDING OR HOME SECURITY SURVEILLANCE, AND REMOTE HEALTH MONITORING ARE ALSO IMPROVED BY CONNECTED DEVICES. CONNECT A PLETHORA OF DEVICES ACROSS THE WORLD For connectivity providers such as mobile operators, one of the main challenges of Machine-to-Machine (M2M) and Internet-of-Things (IoT) markets is to provide optimized global connectivity to Original Equipment Manufacturers (OEM) who are distributing their connected devices worldwide. This means having the ability to activate connectivity only for devices being used, benefing always from local tariff plans, and ensuring usage of the best network. Business-critical or security-related connected objects require demanding Service Level Agreements from connectivity providers. Mobile operators will need new ways to monitor the quality of the service and to prevent service failures traditional tools being no longer adapted to the requirements of M2M and IoT. BRING TRUST IN M2M AND IOT With more and more devices connected to back-end applications, through the public Internet or through mobile networks, new security concerns emerge about confidentiality, integrity and control of data. 80% of Internet connected devices have potential security flaws. Hacking of these devices does not only A HIGHLY SUCCESSFUL MARKET The global Machine-to-Machine and Internet-of-Things market is predicted to reach $8.9 trillion dollars by 2020. represent a financial risk but may also involve a threat to human safety. One of the first challenges, given there is no human involvement, is to securely authenticate the devices before transmitting data. Confidentiality and integrity of the information collected is crucial in the development of M2M and IoT. Nobody wants information about their business or how they live to fall in the wrong hands, or to be altered by unauthorized parties. TRANSFORM PRODUCTS WITH SERVICES, IN EVERY VERTICAL BUSINESS At the end of the day, connected devices are only the tip of the Iceberg. Manufacturers are moving from selling products to selling services. Intelligence is in the cloud and in the specific applications developed to optimize operations, to improve product usage and related services, and to analyze customers behavior. There is a need for data collection, application development and device management capabilities that cover not only a given vertical, but also a broader horizontal approach.

14 BILLION CONNECTED M2M DEVICES IN 2020 END-USER BENEFITS OT invents products and solutions that match with end-user needs 27% OF GLOBAL DATA WILL BE PRODUCED BY CONNECTED DEVICES IN 2020 CONNECTIVITY Get the optimum mobile data connectivity for all machines and devices. TRUST Be assured that devices are not being hacked and that stored or transmitted data is not compromised. SERVICES Enjoy better experience of the products through real-time monitoring, support and maintenance, get products better adapted to the needs. TRUST OT FOR SECURE M2M AND IOT CONNECTIVITY OT s comprehensive offer helps the different ecosystem players to tackle the challenges and seize the full benefits of the IoT and M2M market, while covering the very important security aspects related to it. OT s proposition is to bring the highest level of physical resilience and logical security in and around the connected device. OT's dedicated secure elements protect the access to network resources and cloud-based services. They provide the safest possible place to store secret information and execute sensitive M2M and IoT applications. As a provider of digital security solutions and secure elements, one of OT s natural objectives is to streamline M2M and IoT connectivity and subscription management for mobile operators. OT is actively involved in GSMA and other standardization initiatives. MOVE UP THE M2M AND IoT VALUE CHAIN WITH OT Beyond answering these fundamental security and connectivity requirements, OT is positioned as a horizontal M2M and IoT solution provider. Our secure element offering is complemented by a rich panel of solutions, applications and services covering the connectivity management, monitoring for quality of service, and device management for both mobile operators and OEMs. On top of that, OT s portfolio also includes a turnkey solution that allows OEMs and mobile operators to collect, store and analyze data from any device. This solution enables the rapid development of applications tailored to their own business needs or those of their partners. ECOSYSTEM BENEFITS MOBILE OPERATORS / CONNECTIVITY PROVIDERS Capture additional revenue through connectivity services adapted to M2M and IoT, while preserving full security of subscription credentials Move-up the M2M and IoT value chain from connectivity to device management and application enablement Optimize network resources to respond efficiently to the growing demand of M2M and IoT ORIGINAL EQUIPMENT MANUFACTURERS Optimize production chains, stocks, logistics and distributions for connected devices Transform their business from selling products to selling services improving the usage and usability of the products Collect marketing data to better adapt their offering to consumer behavior

OT TRANSFORMING M2M AND IoT OT ANSWERS THE SPECIFIC CONNECTIVITY AND LIFECYCLE MANAGEMENT REQUIREMENTS OF M2M AND IoT COVERING THE NEEDS OF MOBILE OPERATORS, OEMS AND ENTERPRISES. OT S HORIZONTAL OFFER INCLUDES SECURE ELEMENTS AND SOLUTIONS TO MANAGE THE CONNECTIVITY OF DEVICES, REMOTELY CONTROL AND AUTOMATE THEIR MANAGEMENT, MONITOR THE NETWORK QUALITY AND THE CONTINUITY OF SERVICE, SECURE THE END-TO-END COMMUNICATION BETWEEN DEVICES AND APPLICATIONS, AS WELL AS TO COLLECT AND ANALYZE DATA FROM ANY DEVICE, WITH THE ABILITY TO RAPIDLY DEVELOP VERTICAL-SPECIFIC APPLICATIONS. DIM DIM DAKOTA PEARL BY OT OT s DIM is a rich dedicated range of embedded and removable M2M and IoT SIM cards for demanding environments in industrial applications, automotive applications, and consumer electronic devices. DIM are built from the ground up to be compliant within harsh stress conditions typically found in M2M and IoT environments, and designed to provide the extended lifetime and remote monitoring required by more and more M2M and IoT applications. OT s DakOTa is a new range of Remotely Provisionable SIM for the IoT market available in both soldered and plug form factors. Compliant to the GSMA Embedded SIM specifications, these euicc enable mobile operators to download, activate and change their profile over-the-air and thus simplify the assembly and supply chain for device manufacturers and vendors. PEARL BY OT is an advanced secure element which offers a Trusted Execution Environment. PEARL BY OT protects valuable keys and data applications against software and hardware attacks. The security capabilities of PEARL BY OT ensure that M2M and IoT devices can be strongly authenticated and that information exchanged over networks remain protected. M-CONNECT M-MONITOR M-TRUST M-SENSE OT s M-Connect solution enables mobile operators to securely and remotely provision a subscription in a connected device when it is used the first time and, if needed, to change the subscription during the lifecycle of the device. Compliant to the GSMA Embedded SIM specifications, this solution allows OEMs to produce devices independent of the destination country and network, while ensuring privacy and security of mobile operator credentials. OT s M-Monitor solution helps mobile operators prevent and deal with quality issues and service interruptions, relying on very detailed quality and continuity of service reports. It allows them to get an accurate picture of M2M and IoT devices coverage in real time and to receive early warning about the DIM end of life or an abnormal usage. OT s M-Trust solution provides the end-to-end security between connected devices and application servers, ensuring secure authentication of the connected devices as well as confidentiality and integrity of the data transmitted. Regardless of the communication network used, M-Trust ensures that the device and server exchanging data are properly identified and that the data is encrypted so it will not be tampered or read by unauthorized parties. OT s M-Sense solution makes it easy to collect data from different devices with multiple data protocols and connected to various networks. It enables enterprises to get actionable information and to remotely control their assets, thanks to its existing business rules and device management capabilities. With M-Sense, enterprises can also develop vertical applications to fit their business-specific needs in a timely manner.

WWW.OBERTHUR.COM OBERTHUR TECHNOLOGIES HAS A UNIQUE EXPERIENCE TO PROVIDE MACHINE-TO-MACHINE SOLUTIONS AN INNOVATION-ORIENTED PARTNER A LEADER IN THE PAYMENT MARKET AN INTERNATIONAL TELECOM EXPERT A MAJOR ACTOR IN THE IDENTITY MARKET OVER 10 YEARS TRANSPORT SUPPLY EXPERIENCE A SOLUTION DEVELOPMENT AND MANAGED SERVICES EXPERT A LEADER IN SECURED PERSONALIZATION GLOBAL AND LOCAL SUPPORT CAPABILITIES Expert in Smart Transactions, Digital Payments, Machine-to-Machine, Digital Identity and Transport & Access Control A portfolio of more than 500 patents with an average validity of 15 years 700 engineers in 11 R&D centers Participation to industry and open standards (ETSI, GP, 3GPP, GSMA, OMA, FIDO Alliance ) Trusted partner of over 2,000 banks and financial institutions An EMV pioneer in the U.S. Securing payments with international and local schemes such as MasterCard, Visa, Discover, Amex, CB, CUP Expert in security (EAL4+, MasterCard, Visa) Technology trusted by over 400 telecom customers including 8 of the world s top 10 operators Leader in the secure elements market for device manufacturers (OEM) Ecosystem facilitator in mobile payment and major transport projects worldwide Ranked number one in contactless market by ABI Research and recognized for being the first to achieve significant wins for embedded Secure Elements as well as fostering high-level partnerships End-to-end offer enabling and securing Machine-to-Machine and Internet-of-Things services Over 60 core MNO solution references, leveraging a global OTA offer compliant to LTE and HTTP Over 100 Identity references Over 350 million highly secure Identity documents currently deployed and used on the field 20+ years experience in electronic chip development, cryptography and biometric standards Broad variety of digital security systems to closely assist administrative authorities and companies 50 references worldwide A leading supplier of MIFARE, Calypso and CIPURSE A founding member of the OSPT Alliance Solutions operated from secured and certified OT data centers or deployed in-house High availability service and 24/7 support and maintenance Software development expert in UNIX, C, C++ and Java environments Trusted partner for hosting sensitive information Unique global tool for all kinds of personalization of all smart card products Over 6,000 employees worldwide 5 manufacturing hubs (Europe, North America, South America, Asia and Middle East Africa) A network of almost 40 service centers Flash this code to download the document www.oberthur.com/ot/ot_m2m.pdf DISCOVER THE M WORLD our magazine available on tablets and smartphones www.oberthur.com/themworld LEARN MORE ABOUT OT OBERTHUR.COM TWITTER LINKEDIN YOUTUBE 2015 Oberthur Technologies. All rights reserved. Specifications and information subject to change without notice. The products described in this document are subject to continuous development and improvement. All trademarks and service marks referred to herein, whether registered or not in specific countries, are the property of their respective owners. Oberthur Technologies respects the environment. The number of printed brochures produced by the company has been significantly reduced to save paper. Printed documents are produced on FSC-certified paper using aqueous inks to reduce environmental impact. Oberthur Technologies is certified ISO 9001 : 2008