IoT has the
potential to generate
of value in the
next decade
$19tr
©Gemalto2016.Allrightsreserved.Gemalto,theGemaltologo,aretrademarksandservicemarks
ofGemaltoandareregisteredincertaincountries.EB(EN)-June.2016–Design:FuturityMedia
The Internet of Things touches many different sectors and
applications, ranging from connected cars to smart homes
and intelligent infrastructure. This diversity has spawned
an ecosystem that consumers need to trust to keep their
data protected.
Nine out of 10 senior-level IT decision makers harbor doubts
about their networks’ robustness and scalability in handling IoT.
of consumers polled were
concerned that a connected
appliance could result in
the breach of sensitive data.
253 health data breaches
in 2015. The top six data
breaches affected more
than a million individuals.
The top ten data breaches
accounted for 111 million
records that were lost, stolen
or inappropriately disclosed.
Businesses are currently losing $700
billion a year in IT downtime. Network
interruptions are the biggest culprit.
Bringing Trust to
the Internet of Things
CONNECTIVITY
MONETIZE
SECURITY
1. Gartner forecast Nov 2015
2. Gartner forecast Nov 2015
3. Vanson Bourne study for Brocade Communications
4. IHS: The cost of server and network application downtime
5. GSMA (EY Embedded SIM Study)
6. Fortinet Connected Home Survey
7. Office of Civil Rights
8. Washington Post, “Cisco CEO at CES 2014: Internet of Things is a $19 trillion opportunity”, January 2014
9. Cap Gemini: (“The Internet of Things: Are Organizations Ready for a Multi-Trillion Dollar Prize?”)
10. Gartner
Reliable
Connectivity
Reliable
Security
Agile
Monetization
3 pillars
are essential to
deliver trust in the IoT ecosystem:
1 2 3
Reliable connectivity is the backbone of any IoT use case.
The promise of connected vehicles, for example, is being
fulfilled by embedded connectivity.
2012
26%
55%
25%
23%
52%
23%
27%
49%
19%
27%
52%
19%
31%
51%
16%
31%
53%
15%
31%
54%
66.9M
56.2M
42.9M
31M
19.9M
14.1M
10M
2013 2014 2015 2016 2017 2018
CONNECTED CARS ANNUAL SALES BY TECHNOLOGY
of organizations still do not
generate service revenues
from their IoT solutions.
DEVICE MONETIZATION
Charge a premium for enabling connectivity
and upgrading features on devices.
SERVICE MONETIZATION
Enable new business models like PaaS
(Product-as-a-Service) and facilitate
new services remotely.
DATA MONETIZATION
Monetize the data collected from connected
devices for data analytics.
For more information, please visit Gemalto.com/iot
or mail us at iot.query@gemalto.com
To learn more, visit our IoT Security page or download
our IoT Security e-book
$700bn
68%
70%
drop in revenue for device
manufacturers not using agile
software monetization solutions.
20%
Embedded
Tethered
Smartphone
A 3-STEP APPROACH TO IOT SECURITY
CAGR+37%
1
2
3
SECURE THE DEVICE
SECURE THE NETWORK
SECURE THE CLOUD
MONETIZING AT DIFFERENT STAGES OF THE IOT VALUE CHAIN
Hacks can happen at any level on any connected devices.
Robust security shuts the door on cybercriminals and
gives consumers confidence to trust and share data on
new IoT channels.
(5)
(6)
(7)
(3)
(4)
(10)(9)
(8)
connected devices
in total by 2020
20.8bn
IoT endpoint
spending will reach
by 2020
$3.01tn
(1)
(2)

iot-bringing-trust-to-iot[1]

  • 1.
    IoT has the potentialto generate of value in the next decade $19tr ©Gemalto2016.Allrightsreserved.Gemalto,theGemaltologo,aretrademarksandservicemarks ofGemaltoandareregisteredincertaincountries.EB(EN)-June.2016–Design:FuturityMedia The Internet of Things touches many different sectors and applications, ranging from connected cars to smart homes and intelligent infrastructure. This diversity has spawned an ecosystem that consumers need to trust to keep their data protected. Nine out of 10 senior-level IT decision makers harbor doubts about their networks’ robustness and scalability in handling IoT. of consumers polled were concerned that a connected appliance could result in the breach of sensitive data. 253 health data breaches in 2015. The top six data breaches affected more than a million individuals. The top ten data breaches accounted for 111 million records that were lost, stolen or inappropriately disclosed. Businesses are currently losing $700 billion a year in IT downtime. Network interruptions are the biggest culprit. Bringing Trust to the Internet of Things CONNECTIVITY MONETIZE SECURITY 1. Gartner forecast Nov 2015 2. Gartner forecast Nov 2015 3. Vanson Bourne study for Brocade Communications 4. IHS: The cost of server and network application downtime 5. GSMA (EY Embedded SIM Study) 6. Fortinet Connected Home Survey 7. Office of Civil Rights 8. Washington Post, “Cisco CEO at CES 2014: Internet of Things is a $19 trillion opportunity”, January 2014 9. Cap Gemini: (“The Internet of Things: Are Organizations Ready for a Multi-Trillion Dollar Prize?”) 10. Gartner Reliable Connectivity Reliable Security Agile Monetization 3 pillars are essential to deliver trust in the IoT ecosystem: 1 2 3 Reliable connectivity is the backbone of any IoT use case. The promise of connected vehicles, for example, is being fulfilled by embedded connectivity. 2012 26% 55% 25% 23% 52% 23% 27% 49% 19% 27% 52% 19% 31% 51% 16% 31% 53% 15% 31% 54% 66.9M 56.2M 42.9M 31M 19.9M 14.1M 10M 2013 2014 2015 2016 2017 2018 CONNECTED CARS ANNUAL SALES BY TECHNOLOGY of organizations still do not generate service revenues from their IoT solutions. DEVICE MONETIZATION Charge a premium for enabling connectivity and upgrading features on devices. SERVICE MONETIZATION Enable new business models like PaaS (Product-as-a-Service) and facilitate new services remotely. DATA MONETIZATION Monetize the data collected from connected devices for data analytics. For more information, please visit Gemalto.com/iot or mail us at iot.query@gemalto.com To learn more, visit our IoT Security page or download our IoT Security e-book $700bn 68% 70% drop in revenue for device manufacturers not using agile software monetization solutions. 20% Embedded Tethered Smartphone A 3-STEP APPROACH TO IOT SECURITY CAGR+37% 1 2 3 SECURE THE DEVICE SECURE THE NETWORK SECURE THE CLOUD MONETIZING AT DIFFERENT STAGES OF THE IOT VALUE CHAIN Hacks can happen at any level on any connected devices. Robust security shuts the door on cybercriminals and gives consumers confidence to trust and share data on new IoT channels. (5) (6) (7) (3) (4) (10)(9) (8) connected devices in total by 2020 20.8bn IoT endpoint spending will reach by 2020 $3.01tn (1) (2)