Enterprise IoT in Asia Pacific: Scope of deployments, use cases and investment plans

  • ID: 4447246
  • Report
  • Region: Asia, Asia Pacific
  • 35 pages
  • GlobalData
1 of 3
Enterprise IoT in Asia Pacific: Scope of deployments, use cases and investment plans

Summary

"Enterprise IoT in Asia Pacific: Scope of deployments, use cases and investment plans", a new Telecom Insider Report provides an in-depth examination of end-users perspectives on IoT with respect to investment areas and return on investment expectations for IoT projects, top use cases and key drivers for IoT deployments, scope of IoT deployment from connectivity technologies to security considerations and approach to data management & analytics and vendor selection criteria and preferences. The analysis is built on the results of an extensive survey of more than 1,000 enterprises worldwide, with close to a third of them in the Asia Pacific region.

This report examines executives’ opinion about IoT deployment and investment plans in Asia-Pacific. The survey-based insider presents opinions of executives operating across various industries in organizations with number of employees ranging from 5 to over 10,000. The report also highlights various use cases, drivers and challenges for deploying IoT solutions.

The report consists of the following sections:
  • Objectives and methodology: an overview of objectives, methodology and profile of respondents included in the survey for this report.
  • Enterprise IoT investment drivers and trends: This section analyzes the survey results on the top IoT use cases, drivers and challenges for IoT projects and investment plans as well as expectations for RoI.
  • Scope of enterprise IoT deployments: This section focuses on key trends with respect to geographic and technological scope of IoT deployments as well as security concerns and measures and enterprise approach to data management and analytics.
  • IoT project management strategies: This section assesses enterprise criteria for vendor selection and approach to IoT project management.
  • Key findings: key findings and conclusions obtained from the survey results in Asia Pacific.
Scope

Selected key findings of the report include:
  • Top use cases for IoT are equipment process & management and building management driven by the prospect of cost reduction and efficiency gains.
  • Similar to the global trend, most of the IoT deployments in Asia Pacific use long range wireless technologies for connectivity and specifically use 3G and LTE technologies for licensed connectivity and Wi-Fi for unlicensed.
  • Most organizations use encryption and authentication to secure sensitive, high-value or mission-critical data produced by IoT devices.
  • Survey results indicate that telcos are best positioned for business consulting and device and connectivity management solutions.
Reasons to buy
  • The insider report, examines the IoT market in Asia Pacific through the opinions of executives from 304 enterprises in various sectors, and will help industry stakeholders better understand enterprise adoption and investment trends in the region.
  • The report provides an analysis of factors driving the IoT projects, top use cases and challenges in getting the IoT project off the ground to help market stakeholders formulate effective product development and marketing plans.
  • The report provides an assessment of key areas of investment over the next 12-24 months that should help stakeholders determine go-to-market approaches and optimize resource allocation.
READ MORE
Note: Product cover images may vary from those shown
2 of 3
Section 1: Objectives and methodology
Objectives
Methodology
Profile of survey respondents
Section 2: Enterprise IoT investment drivers and trends
Use cases
Key benefits and inhibitors
Investment plans
Return on investment goals
Section 3: Scope of enterprise IoT deployments
Geographic scope
Connectivity technologies
Type of technologies
Security strategies
IoT security risks
Approaches to securing data
Data management and analytics
Section 4: IoT project management strategies
Vendor selection
Internal IoT project management
Section 5: Key findings
About the authors
Related research
Contact information

List of Tables
Exhibit 1: Respondents breakdown by industry
Exhibit 2: Use cases
Exhibit 3: Use cases by countries (Developed markets)
Exhibit 4: Use cases by countries (Emerging markets)
Exhibit 5: Key benefits expected
Exhibit 6: Challenges in getting IoT project off the ground
Exhibit 7: Areas of investment
Exhibit 8: Geographic scope of deployment
Exhibit 9: Scope of deployment by countries
Exhibit 10: Type of connectivity used or planning to use
Exhibit 11: Short range wireless unlicensed
Exhibit 12: Long range wireless unlicensed
Exhibit 13: Long range wireless licensed
Exhibit 14: Security strategies
Exhibit 15: Most significant IoT security risks
Exhibit 16: Approach to securing data produced by IoT devices
Exhibit 17: Location of Analysis of IoT Data
Exhibit 18: Vendor selection criteria
Exhibit 19: Preferred vendor
Exhibit 20: Internal IoT project management, 2017

List of Figures
Exhibit 1: Respondents breakdown by industry
Exhibit 2: Use cases
Exhibit 3: Use cases by countries (Developed markets)
Exhibit 4: Use cases by countries (Emerging markets)
Exhibit 5: Key benefits expected
Exhibit 6: Challenges in getting IoT project off the ground
Exhibit 7: Areas of investment
Exhibit 8: Geographic scope of deployment
Exhibit 9: Scope of deployment by countries
Exhibit 10: Type of connectivity used or planning to use
Exhibit 11: Short range wireless unlicensed
Exhibit 12: Long range wireless unlicensed
Exhibit 13: Long range wireless licensed
Exhibit 14: Security strategies
Exhibit 15: Most significant IoT security risks
Exhibit 16: Approach to securing data produced by IoT devices
Exhibit 17: Location of Analysis of IoT Data
Exhibit 18: Vendor selection criteria
Exhibit 19: Preferred vendor
Exhibit 20: Internal IoT project management, 2017
Note: Product cover images may vary from those shown
3 of 3

Loading
LOADING...

4 of 3
Note: Product cover images may vary from those shown
Adroll
adroll