???????????????????????????????????????
Watch video
Gemalto interviewed Agustin Macarro, eSIM Project Manager, Telefónica Germany on his vision on how to introduce the eSIM on the market.
Gemalto interviewed Mr.Sergio Cozzolino, eSIM Ecosystem Project Manager, Telecom Italia, Italy on his vision on IoT and what role eSIM plays in this vision.
Gemalto interviewed Mr.Jean-Christophe Tisseuil, Head of SIM & eSIM, GSMA on his vision on IoT and what role eSIM plays in this vision.
This demo showcases the simplicity of managing cellular subscriptions on wearable devices, using Gemalto's On-Demand Connectivity solution, and an eSIM (embedded SIM or eUICC) inside a Samsung Gear S2.
On-Demand Connectivity (ODC) provides instant connectivity everywhere, right out of the box. Addressing the M2M market and other connected devices, ODC helps operators and device manufacturers to offer a positive customer experience throughout the device's entire lifecycle.
Device manufacturers can forget complex logistics for connectivity regardless of the country where the product is finally sold. The built-in connectivity allows the subscription to be personalized and activated when the device is first switched on. Operators can boost their 3G/4G data usage and provide other value added services while end users can choose the most suitable subscription package and connect their device with minimum hassle.
Watch how Mobile Connect can ease the digital life of a family. In this 2nd episode, discover the simple, fast & secure online banking thanks to Gemalto Mobile ID solution.
Watch how Mobile Connect can ease the digital life of a family. In this 1st episode, discover the simple, fast & secure online purchase done thanks to Mobile Connect powered by Gemalto
Ditch your dozens of passwords for a simpler solution that works across all your devices
Find out how secure environment detection works, with mobile apps detecting Operating System (Android and IOS) vulnerabilities and reacting accordingly.
Find out how secure key pads protect against PIN/Password capture by spying malwares (key loggers).
Find out how intensive code obfuscation protects against reverse engineering, preventing the code logic and structure from being revealed in clear.
Find out how data encryption can protect sensitive data from being revealed in clear.
Find out in the LTE world how to provide subscribers automatic access to new multimedia services (easy identification for video calls, VoIP...) and ensure 100% success rate at first subscription activation.