fedele gallileo may 16, 2017 milano - iothingsmilan · people and things protect we run secure...

24
Bringing Trust to the IoT - Connect. Secure. Monetize. Fedele GallileoMay 16, 2017 Milano

Upload: others

Post on 08-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

Bringing Trust to the IoT - Connect. Secure. Monetize.

Fedele Gallileo– May 16, 2017 – Milano

Page 2: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

The possibilities are increasing daily…

…but so are the threats.

2 IOT/WT Innovation World Cup 2017/18 | Milano – May 16, 2017

$1trillion+REMOTE PAYMENT

TRANSACTIONS VALUE IN 2021

JUNIPER RESEARCH 32.5bnTOTAL NUMBER OF IoTCONNECTIONS IN 2026

BERG INSIGHT

3.6bneDOCUMENTS IN

CIRCULATION BY 2021

ABI RESEARCH

1bnDATA RECORDS

BREACHED IN 2016

BREACH LEVEL

INDEX

Page 3: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

Trust is vital – and it’s what we provide…

…enabling our clients to deliver a vast range of trusted

digital services for billions of individuals and things.

3 IOT/WT Innovation World Cup 2017/18 | Milano – May 16, 2017

Page 4: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

Our technologies are based on 2 interlocking processes…

IOT/WT Innovation World Cup 2017/18 | Milano – May 16, 20174

AuthenticateWe embed secure

software in devices and

objects to authenticate

people and things

ProtectWe run secure software

on platforms to protect

and encrypt data across

networks

…thereby reducing digital fraud risk

and creating value for customers.

Page 5: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

Bringing trust to connected devices, digital banking, cloud access, eGovernment,

vehicle telematics, software licensing and more.

Our core technology is used across six main markets

Enterprise Security

Internet of ThingsMobileBanking & Payment

Government Software Monetization

5 IOT/WT Innovation World Cup 2017/18 | Milano – May 16, 2017

Page 6: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

We are trusted by some of the world’s biggest brands

6 IOT/WT Innovation World Cup 2017/18 | Milano – May 16, 2017

100+eGOVERNMENT

PROGRAMS

30,000+ENTERPRISES

3,000+FINANCIAL

INSTITUTIONS

450MOBILE

OPERATORS

Page 7: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

Internet of Trusted Things:

Connect. Secure. Monetize.™

IOT/WT Innovation World Cup 2017/18 | Milano – May 16, 20177

• Integrators

• Mobile network operators

• Service providers

• Car manufacturers

• Consumer electronics

• Smart energy suppliers

• Healthcare device suppliers

• Home automation device

manufacturers

OUR CLIENTS OUR SOLUTIONS

Safe driving and better

engine performance Lightfoot’s advanced telematics device uses

our IoT technology to monitor driving habits and

engine efficiency. By identifying optimal power

and performance the solution reduces drivers’

environmental impact and improves road safety.

Always-on connectivity: wireless modules & terminals,

eSIM, MIM

Flexible subscription

management: On-Demand Connectivity

Lifecycle management: connectivity monitoring,

secure remote credentials

management

End-to-end IoT Security: secure elements, data

encryption, ID management

& verification

Agile IoT Monetization: IP Protection, Licensing

& Entitlement Management

Page 8: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

Future-proof solutions

Out-of-the-box connectivity

Multiple form factors

Quality of Service

Subscription Management

Gemalto brings a circle of trust to industrial IoT

Secure the device

Secure the data

Secure the cloud

Secure the network

Security Audit and lifecycle management

MonetizeConnect

Secure

Flexible revenue models

Licensing and entitlement

software

IoT application development

OTA upgrades

IOT/WT Innovation World Cup 2017/18 | Milano – May 16, 20178

Page 9: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

Gemalto Brings Trusted Connectivity to Industrial IoT

Page 10: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

Gemalto provides reliable, future proof connectivity

– ensuring long-run uninterrupted services

IOT/WT Innovation World Cup 2017/18 | Milano – May 16, 201710

Ruggedized modules

Compatible footprints with easy migration

to latest technologies (LTE) – optimizing

roll-outs

Quality of Service Platforms for remote

lifecycle management

Easy Network Subscription Management

Global technology consulting services and

engineering support 2G 3G LTE

Page 11: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

Gemalto’s M2M-optimized SIMs are built for longevity

IOT/WT Innovation World Cup 2017/18 | Milano – May 16, 201711

From SIM cards to MIMs™ (Machine Identification Modules)

Ruggedized for long life

in extreme conditions

Encrypt and

authenticate data

Secure the identity

of machines

communicating

on cellular

networks

Small footprint for easy integration

Comply with the

highest automotive

standards

From SIM to MIM

Page 12: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

Gemalto helps to deliver outstanding service levels…

Gemalto enables trusted digital communication12

Gemalto MIM and Module Services manage the long lifecycle of deployed assets:

Regular remote audits and hardware monitoring

Over-The-Air maintenance and firmware updates

Quick launch of new device features

of mobile operators believe they need to extend the monitoring

of customer experience to cover expanding IoT services1. 90%

OVER

¹ Telecoms.com Annual Industry Survey 2016

Page 13: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

...and to monitor smart object connectivity in real-time

Gemalto enables trusted digital communication13

The Quality of Services for IoT ensures enhanced connectivity for smart objects

• for MNOs

• . Real-time networks performance status

• . Alarms and notifications for fast issue resolution

• . Advanced analytics through customised

• measurement dashboards

• . Advanced SLA dashboard

for IoT Device Makers and Service Providers

. Best operator selection

. Alarms and notifications for fast issue resolution

. Advanced analytics

. SLAs monitoring and enforcement

KEY BENEFITSDATA

COLLECTION

PROCESS

IN THE DEVICE

IoT QoS Agent

IoT QoS Applet

SERVER

PLATFORM

IN THE CLOUD

IoT QoS Server

ANALYTICS DASHBOARDS

Advanced

Analytics

Service Level

Agreement

Real Time

Alert

Customer

Service

FRONT END

Page 14: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

We provide out-of-the-box connectivity anytime, anywhere

IOT/WT Innovation World Cup 2017/18 | Milano – May 16, 201714

Flexible mobile network subscription management for the entire lifecycle of the device

Full profile download

on first use of device

Connectivity subscription profile activated,

removed or swap as required

On-Demand Connectivity Solution

Easier manufacturing process

Simplified device logistics

Agile and future-proof connectivity subscription

INITIAL

PROVISIONING

LIFECYCLE

MANAGEMENT / LONG

TERM RELIABILITY

CONTEXTUAL

CHANGE

Page 15: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

Gemalto Enables Security By Design

Page 16: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

4%

7%

10%

17%

18%

18%

21%

21%

24%

28%

30%

34%

Don't know

None — we don't have any concerns

We can't find the right supplier(s)

Lack of executive support

Regulatory issues or concerns

We don't think that we have an application or process

Difficulty and risk of migration or installation

Pricing is unclear or complicated

Lack of technology maturity

Integration challenges

Total cost concerns (total cost of ownership)

Security concerns

Security tops the list of IoT concerns

What are your firm’s concerns, if any, with deploying M2M/Internet of Things technologies?

Base: 3627 global business and technology decision makers (20+ employees) in 7 online countries only

Source: Forrester’s Global Business Technographics® Networks And Telecommunications Survey, 2015

IOT/WT Innovation World Cup 2017/18 | Milano – May 16, 201716

Page 17: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

Consumers and Enterprises only

want authorized entities to have

access to their devices or data

Secure components and solutions

must be embedded into “things” to

protect data at rest or in motion

Hackers will take advantage,

whenever there is a security

loophole

15seconds

Time required by

a hacker to

backdoor a smart

thermostat device

75,000 spam emails sent

by an internet

connected fridge

during holiday

break

471,000connected vehicles

found vulnerable to

cyber attacks

IOT/WT Innovation World Cup 2017/18 | Milano – May 16, 201717

Authentication &

privacy is critical

Source: TBC – please provide sources. Not in other presentations or ebook

Page 18: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

Gemalto’s approach to security

considers the complete security

lifecycle of a connected object.

At all stages, including data at

rest and in motion from the

network to the cloud.

> Software Activation & Licensing

> Dynamic Key Management

(for Authentication & Encryption)

> Secure Provisioning of

Key Credentials & Tokens

> Big Data Encryption

> Server Protection

> Cloud Application Security

> Device Access Security

> Sensitive Data Security

> Communication Encryption

> Software Integrity Protection

IoT SECURITY

CONSULTING &

CERTIFICATION

SERVICES

SECURITY

LIFECYCLE

MANAGEMENT

SECURE

THE DEVICE

SECURE

THE CLOUD

IOT/WT Innovation World Cup 2017/18 | Milano – May 16, 201718

A closed loop

safeguards Trust in IoT

Page 19: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

Gemalto Helps Monetize your Industrial IoT Solutions

Page 20: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

IOT/WT Innovation World Cup 2017/18 | Milano – May 16, 201720

Transformation into a software

company is challenging

but crucial

“The notion that there is huge difference

between the industrial world and the

software world is no longer valid….

those days are over. In today’s world,

everything is software”

Jeffrey ImmeltChief Executive Officer

General Electric

81%Subscription Revenueof the top 100 software vendors have

subscription revenues.

Consumption Modelsof enterprises expect to increase amount of

software they purchase via consumption.

IP Theftof software vendors identify a negative

impact on bottom-line due to IP theft.

Non-complianceof enterprises suffer from non-compliance

with software license agreements.

Source: Emerging Software Business Models in Third

Platform Environments, IDC 2015

Source: The State of Software Monetization Survey, Vanson

Bourne/Gemalto, 2015

Source: Emerging Software Business Models in Third

Platform Environments, IDC 2015

Source: The State of Software Monetization Survey, Vanson

Bourne/Gemalto, 2015

63%

59%

73%

Page 21: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

IOT/WT Innovation World Cup 2017/18 | Milano – May 16, 201721

What are our customer challenges?

Lifecycle ManagementCentralize, automate, and manage operational

and support activities across the entire

licensing lifecycle.

Product Usage InsightGain full visibility into customer contracts, feature

usage, and service agreement status.

Customer Self ServiceDeliver intuitive end-user license and entitlement

self-service capabilities.

IP ProtectionProtect products and services from reverse

engineering and code tampering.

Secure LicensingEnsure compliance and enforce license

agreements/service contracts.

Business Model VersatilityAdapt packaging and licensing models

to meet evolving business needs and

market trends.

Page 22: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

Reduce risks and impacts associated

with security breaches

Realizing the Benefits ofa Totally Connected World

IOT/WT Innovation World Cup 2017/18 | Milano – May 16, 2017

Lower operating costs for business

More opportunity to partner

Business continuity

New business models

22

Page 23: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

Join the IoT/IoT Innovation World Cup!

IOT/WT Innovation World Cup 2017/18 | Milano – May 16, 201723

Register for the IOT/WT Innovation World Cup 2017/18 for an opportunity to qualify

for a Cinterion® Concept Board or Cinterion Connect Shield

Free support on our Developer Community at developer.gemalto.com

Special Security Award powered by Gemalto!

How does your solution address any digital security challenges regarding securing

the device, securing the network and the cloud, or securing the communication?

Page 24: Fedele Gallileo May 16, 2017 Milano - IoThingsMilan · people and things Protect We run secure software on platforms to protect and encrypt data across networks …thereby reducing

Want to know more?

24 IOT/WT Innovation World Cup 2017/18 | Milano – May 16, 2017