The M2M market for cellular connectivity is forecast to triple from $5 billion to $15 billion by 2018. Much of the value is tied to a small number of large contracts with players such as automotive manufacturers and utilities, but there is considerable value in the long tail of smaller contracts. We believe that small mobile network operators (MNOs) can position themselves effectively to win these M2M contracts, even if they lack the resources to win large single contracts. Smaller operators can take three steps to strengthen their M2M strategy.
1. Get the basics right
The tools and processes that MNOs use for the consumer retail market cannot be used for M2M. Small MNOs (typically those that cover a local or small regional market) that want to compete with larger players need to recognize this and invest in two basic elements of an M2M service: a device connectivity platform and a dedicated M2M team.
For M2M, MNOs need the systems in place to automate the provisioning, in-life management (for example, fault monitoring and policy management) and decommissioning of SIMs because of the potentially large volume of M2M connections. Some global operators, such as Vodafone, have developed their own systems, but small operators should consider buying a device connectivity platform from a vendor such as Ericsson or Jasper Wireless as a low-cost and low-risk solution.
Successful MNOs in the M2M sector have dedicated teams for M2M business activities, including marketing communications, product marketing, sales support, platform support and partnership management. These MNOs have the human resources required to best address the unique aspects of the M2M ecosystem, which include long sales cycles, intensive presales effort and a solutions-based sales approach.
2. Target established customer bases
Challenger MNOs should prioritize their current enterprise customers as targets for M2M solutions. From interviews with enterprises buying M2M services, we know that they are more likely to look to their current telecom provider than a new operator when adopting M2M services.
To increase the effectiveness of their M2M business development effort, MNOs should segment their sales force based on the enterprise's volume of connections rather than its number of employees, which is operators' typical approach. Large enterprises do not necessarily have a high number of M2M connections while SMEs might.
3. Avoid highly competitive verticals
Small MNOs should avoid M2M applications such as those for the automotive sector, in which large operators (such as AT&T, Telef—nica and Vodafone) are likely to win the large contracts on offer. Instead, the contender operators should focus on a small number of verticals where they can offer greater differentiation.
As part of this approach, MNOs should analyze their established client base to identify groups of customers that will require similar solutions, and then partner with applications providers that can help provide those solutions. For example, operators could look to partner with companies such as MB Connect Line (Germany) for remote maintenance of heavy equipment, Aerotel Medical Systems (Israel) for remote patient monitoring systems and personal trackers and Priva (the Netherlands) for building energy management systems.
MNOs can struggle to decide which vertical markets to focus on when thinking about entering the M2M market because of the wide range of industries that M2M can address. Large operators with significant financial resources may want to invest in solutions for multiple vertical markets, but small operators need to be more selective in which applications they offer. We recommend that they do so through partnerships, rather than trying to develop their own solutions.
Nuno Afonso is a consultant at Analysys Mason - nuno.afonso@analysysmason.com
This is part 4 of the cover story “Everything is connected” published in Telecom Asia Feb/Mar 2014 printed edition.
Part 1: When everything is connected
Part 2: Succeeding in the IoT game
Part 3: Time to get serious about IoT
Part 4: Narrow focus to differentiate
Part 5: Top five threats to IoT devices