IoT World 2017: What’s really needed for a successful and trusted Internet of Things?

Last updated: 05 July 2017

It’s said that there will be 20.8 billion connected devices – and only nine billion people – in the world by 2020. With a little quick math, that’s at least two or three devices per person. Before the Internet of Things (IoT) really took off, these “devices” would be automatically assumed to be smartphones or computers. But that’s not the case anymore.

Now we have to factor in connected cars, smart refrigerators, wearables and even intelligent buildings. As Spiderman’s uncle once told us “With great power comes great responsibility.” So as the IoT continues to grow across sectors and applications, three key pillars are essential to deliver trust, new revenue streams, operational excellence and increased customer intimacy to the ecosystem.

Next week at Internet of Things World, visit booth #1714 to experience how Gemalto and attending partner, West’s Safety Services, create the reliable connectivity, end-to-end security and agile monetization needed for any IoT deployment.

Connect. Secure. Monetize.™ with Gemalto


Did you know that nine out of ten senior-level IT decision makers doubt the robustness and scalability of their networks in regards to IoT? Reliable connectivity is the backbone of any use case, and the last thing providers want is to lose connectivity in the middle of a crisis.

For example, West’s Emergency Aware Services – with a little help from Gemalto’s modules and services – can sense something like a fire, and allow you to instantly geo-fence the area, asses the seriousness of the situation, and identify and notify first responders in the area. Without reliable connectivity, the process would lack the critical link to improve emergency response.


As our devices get smarter, so do the hackers. But with a three-step approach of securing the device, the network and the cloud, we can slam the door on cybercriminals and give consumers and enterprises the confidence to share data across new IoT channels.

In a context of booming LPWANs (Low-Power Wide Area Networks), we will be demonstrating our new Trusted Key Manager (TKM) solution for low-power LoRa® networks which ensures end-to-end security and the flexibility to choose any LoRa network operator. To ensure the integrity of LoRa IoT solutions, the Trusted Key Manager facilitates a strong mutual authentication process, based on unique keys shared between the IoT device and the LoRa network and between the IoT device solution providers.

By making sure all three aspects – the device, the network and the cloud – are secure – are secure, stakeholders can then manage massive fleets of devices and ensure trust for IoT connected objects that thrive on cost-efficient, low-data rate connectivity.


One of the biggest promises of IoT is the change in mindset for doing business – a mindset to move from a product-based monetization approach to a service-based approach. This requires an agile monetization framework that allows all contributors to leverage from the new IoT business models, and have the agility to meet customer expectations and increase ROI.

Gemalto’s Sentinel Software Monetization solutions enable organizations do just that through feature-based software licensing and entitlement management. Software developers and device makers can control their assets and data, introduce new billing models and protect against software piracy, therefore, increasing the value of a “smart” device by opening new channels for companies to monetize.


Want to learn more?

Visit, stop by booth #1714 or request a meeting with one of our experts at the event!

On the day prior to the event – and back by popular demand – Gemalto will host its second annual IoT Strategy and Innovation Workshop to examine the best strategies for successful IoT deployments.

May 15 from 9am – 6pm PST | Santa Clara, CA | Register here.