wireless technology and the security industry key trends and risks

15
Information contained in this PPT is confidential, may be privileged, and is intended solely for the person and/or entity to whom it is presented Wireless Technology and the Security Industry Key trends and risks Presented by Dan McDuffie, CEO Wyless

Upload: river

Post on 25-Feb-2016

41 views

Category:

Documents


3 download

DESCRIPTION

Wireless Technology and the Security Industry Key trends and risks. Presented by Dan McDuffie, CEO Wyless. Wyless Company Background. M2M Managed Services Provider with 10 year history and nearly 1 million connected devices on our managed network, CAGR 55% annually last 3 years - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Wireless Technology and the Security Industry Key trends and risks

Information contained in this PPT is confidential, may be privileged, and is intended solely for the person and/or entity to whom it is presented

Wireless Technology and the Security IndustryKey trends and risks

Presented by Dan McDuffie, CEO Wyless

Page 2: Wireless Technology and the Security Industry Key trends and risks

Information contained in this PPT is confidential, may be privileged, and is intended solely for the person and/or entity to whom it is presented

Wyless Company Background M2M Managed Services Provider with 10 year history and nearly 1 million

connected devices on our managed network, CAGR 55% annually last 3 years Offices in Boston, Raleigh-Durham, London & Geneva 115 Employees in 5 countries Connected to 15 Cellular Carriers and growing, serving 220 countries through

roaming and 10 countries with direct network connections Purchased ClearConnex in 2012 to provide end-to-end engineering solutions –

we design cellular products Partnered with most of the leading M2M module and equipment OEMs

worldwide Serving over 500 ASP’s, OEM’s, and large enterprises globally Significant focus/experience in the M2M and the Security Industry ~ 10 years

Page 3: Wireless Technology and the Security Industry Key trends and risks

Information contained in this PPT is confidential, may be privileged, and is intended solely for the person and/or entity to whom it is presented

Agenda Topics Current state of the union of Mobile Networks in the USA Why the move to 4G? Carrier Trends – delivering end-to-end solutions to OUR customers Which carriers are doing what, when and why? Loopholes using Permanent Roaming SIMs, and the risks involved New technologies for multi – carrier solutions Future Proofing your application Conclusions Q&A

Page 4: Wireless Technology and the Security Industry Key trends and risks

Information contained in this PPT is confidential, may be privileged, and is intended solely for the person and/or entity to whom it is presented

The Fixed and Mobile LandscapeMobile Operators are spending more and more money to serve higher bandwidth requirements even as prices fall. 66% increase CAGR increase in mobile data traffic YOY (Cisco) Spectrum efficiency means re-farming existing spectrum capacity for LTE to

serve consumer and corporate craving for higher bandwidth Move from 2G to 3G to 4G is now, just a question of timing Lots of misinformation about exactly how this will take place Two main POTS providers (AT&T and Verizon) arguing to FCC to sunset POTs

over the next 5-10 years Mobile Operators trying to drive up the value chain, this means selling end to

end solutions including security in the consumer space and IT services to corporates

LTE throughput means a real opportunity for broadband fixed line replacement

Page 5: Wireless Technology and the Security Industry Key trends and risks

Information contained in this PPT is confidential, may be privileged, and is intended solely for the person and/or entity to whom it is presented

What’s this all mean?Therefore the wireless connection into the residential and enterprise customer is a Trojan Horse for the cellular carrier, or for you?

In order to stay financially viable, the Mobile Carrier must upsell solutions or face becoming a dumb pipe.

Page 6: Wireless Technology and the Security Industry Key trends and risks

Information contained in this PPT is confidential, may be privileged, and is intended solely for the person and/or entity to whom it is presented

Technology over the next decade +Move from 2G to 3G to 4G

2G CDMA 2G GSM 3G CDMA 3G GSM 4G ALL

1xrtt GPRS EVDO UMTS/HSPA+ LTE

* HSPA + is not really “4G”

Page 7: Wireless Technology and the Security Industry Key trends and risks

Information contained in this PPT is confidential, may be privileged, and is intended solely for the person and/or entity to whom it is presented

The real story – 2G (GPRS/1XRTT)

2016 sunset really means starting now and gone by end 2016

Guaranteed allocation of 25%-30% of 1900 Spectrum for 2G through end 2017 earliest but projecting no sunset date as of yet (safe to assume 2020 earliest)

Commitment for 1xrtt through 2019, anecdotally

No sunset for 1xrtt, saying ‘Network Vision’ will extend 1xrtt “indefinitely”

ALL 4 major operators each cover >300 million POPs with 2G

Page 8: Wireless Technology and the Security Industry Key trends and risks

Information contained in this PPT is confidential, may be privileged, and is intended solely for the person and/or entity to whom it is presented

The real story – 3G (EVDO/HSPA)

No commitment for HSPA longevity but expected through 2020

HSPA longevity committed through 2020

EVDO longevity committed till 2019

No sunset for EVDO, saying ‘Network Vision’ will extend EVDO “indefinitely”

Page 9: Wireless Technology and the Security Industry Key trends and risks

Information contained in this PPT is confidential, may be privileged, and is intended solely for the person and/or entity to whom it is presented

The real story – 4G LTE

237 markets deployed covering 288 Million People

LTE Advanced (10), fastest LTE available, but not fully deployed till mid ’14200 Million POPs by EOY

Most aggressive LTE Deployment yet, fully deployed at “every EVDO Tower” by end ’13, >90% of US POPs by EOY

LTE Rev 10, fastest LTE available, but not fully deployed till end ‘14

Page 10: Wireless Technology and the Security Industry Key trends and risks

Information contained in this PPT is confidential, may be privileged, and is intended solely for the person and/or entity to whom it is presented

The Spectrum Storyspectrum allocation by sub count

$70

Total Spectrum: 109 MHzTotal Customers: 115.8M

Total Spectrum: 97 MHzTotal Customers: 107.0M

Total Spectrum: 54 MHzTotal Customers: 55.6M

Total Spectrum: 76 MHzTotal Customers: 42.4M

Page 11: Wireless Technology and the Security Industry Key trends and risks

Information contained in this PPT is confidential, may be privileged, and is intended solely for the person and/or entity to whom it is presented

The next-gen wireless story

Wireless Backup and Primary at speeds faster and more stable than fixed lines

Page 12: Wireless Technology and the Security Industry Key trends and risks

Information contained in this PPT is confidential, may be privileged, and is intended solely for the person and/or entity to whom it is presented

Permanent roaming trends and risksThe ‘dual or multi carrier SIM’ used in M2M and the Security

Industry is essentially a permanently roaming SIM on the Tier 1 carrier’s networks ‘Roaming’ occurs in both GSM and CDMA, which is mobile operators sharing

network capacity or allowing other operators to roam on their networks, typically meant for TEMPORARY access. This is global in nature (e.g. why your mobile phone works in the Bahamas).

Typical Roaming Scenarios: • Vodafone roams on AT&T and T Mobile for UK travelers to the USA• AT&T roams on T Mobile for enhanced coverage in Northern California• Sprint roams on US Cellular for enhanced coverage in Western Kentucky• Union Wireless roams on AT&T, T Mobile and other rural mobile operators for their off footprint subs

These are based on roaming that is regulated by the FCC and/or GSMA

But Permanent Roaming relates to using loopholes in roaming agreements to leverage a carrier’s network in a way never intended and has RISK

Why? Because (a) roaming agreements change, and (b) SLAs do not exist

Page 13: Wireless Technology and the Security Industry Key trends and risks

Information contained in this PPT is confidential, may be privileged, and is intended solely for the person and/or entity to whom it is presented

Multi carrier the right way New Modules that can handle multiple mobile operators and technologies are

here (only 2G and 3G today) Dual Carrier Solutions (two radios) Cost of LTE modules coming down drastically (LTE Only) Removable technology All can and will be available in both Dial to IP Capture, Ethernet and Wifi

THE CONS: It costs more to do things right.

Page 14: Wireless Technology and the Security Industry Key trends and risks

Information contained in this PPT is confidential, may be privileged, and is intended solely for the person and/or entity to whom it is presented

The facts about all this… (conclusions)

2G GSM is still viable on a 2G panel, a simple SIM replacement buys years 2G will always have more ubiquitous coverage, until it’s gone, and that will

be a while with the exception of AT&T There is no guarantee on 3G HSPA or EVDO Longevity no matter what

anybody says, except Sprint? LTE is the future but module costs are too high to be useful TODAY but

that’s changing in near real time There will be places in America where LTE will NEVER be deployed, but they

will be hard to find There is no “Magic SIM Card” Find out whose SIM your provider is using

and what the nature of their relationship to the ‘hand that feeds them’ is New technologies will revolutionize our business, broadband wireless is

here and now, and if you don’t sell it to your customers somebody else will

Page 15: Wireless Technology and the Security Industry Key trends and risks

Information contained in this PPT is confidential, may be privileged, and is intended solely for the person and/or entity to whom it is presented

Questions and Contacts

Dan McDuffie, CEO Wyless

[email protected]

(978) 502-2809 Mobile

Scott Stanton, Major Accounts, Security Vertical

[email protected]

(630) 291-1895 Office

it’s good to be well connected