The ‘Internet of Things’ is the Game-Changing Next Step for Telcos… But What Are They Missing?
As I travel to meet new telcos and attend an array of trade shows around the globe, one discussion that comes up again and again is how the telco industry can gear up for the world of IoT. And it’s not just a topic that telcos are “a bit” interested in – the sector believes that IoT will drive the fourth industrial revolution, likening it in importance to the discovery of steam power.
As revenues continue to decline in telcos’ traditional core business – calls, data and roaming fees – it is understandable that IoT is being hailed as a natural progression for the telco industry, which is undoubtedly well-positioned to take advantage of the sizable growth opportunity.
So exactly how big is this IoT opportunity?
The numbers seem to change with each new report published, but I’ve picked up on a couple of figures that I think put the opportunity into perspective. One is that each household will have a minimum of 20 connected devices talking to networks by 2020, and that every square mile will have 600 million devices sending small bursts of information. Research from Edgar, Dunn & Company estimates that the number of IoT devices in use by consumers (e.g. wearables, smart home appliances and connected cars) will rise from 4 billion in 2016 to 13.5 billion in 2020 – a threefold rise in only four years!
We can see the early signs of this growing trend, with vending machines re-ordering stock automatically, engineers being sent to failing air con units before they actually fail and the sharp rise in voice-activated connected devices in the average family home. All these things are merely the forerunners for things to come (notwithstanding the constant hype and media coverage around driverless cars).
But what are telcos doing to jump on this opportunity – and what are the challenges they face?
The IoT market is currently viewed in terms of four main pillars:
- Spectrum (the bandwidth to deliver IoT)
- Payments infrastructure
- Fraud and security
From my experience in working with large telcos, it seems that the industry is just focusing on spectrum and commoditization – in other words, how telcos can physically enable IoT technology. Ensuring that the IoT devices operate using low bandwidth transmitters is a critical consideration, as is ensuring that the telco systems themselves have the vast bandwidth needed to carry billions of additional communications per day. With the huge challenges to address in their bid to commercialize the IoT opportunity, it’s understandable that this commands much of the attention of telcos.
The problem is, that in the face of the challenge in addressing these first two pillars, most telcos have not yet progressed to looking at how they will take payments or how they will secure these payments against fraud and risk. Nor are they looking at the impact that the immense volume of transactions might have on their payments infrastructure.
While the list of potential IoT devices is almost endless, all these devices will be communicating via an embedded eSIM i-Sim – and will likely pass on multiple transactions per day. Telcos looking to support IoT services need to ensure they select a payments gateway that supports any type of device and any method of communication, and can support mass volume transactions without disruption to the user experience. Beyond that, it will also be critical to factor in considerations such as availability of a range of payment methods, to ensure mass appeal and consumer convenience.
Of course, it is also vital to ensure that all payments made via IoT devices are secure; fraud should be screened in real-time to minimize risk, delivering a seamless experience and supporting sustained customer adoption.
Payment authorization shouldn’t be overlooked
Lastly – and arguably most importantly – telcos need to make sure the payments solution they put in place can push final confirmation of an IoT purchase back to the consumer, before payment is taken.
Imagine, for example, your smart fridge automatically orders a replacement pack of beer every time you take four out. ”Brilliant!” you might be thinking. In theory, this sounds great, but in reality, there is too much room for error, with consumers easily losing control of both their fridge contents and their money. The best approach is to have a final point of authorization for each payment. This can easily be done in a fast and convenient way that doesn’t disrupt the experience for the customer – a simple SMS or biometric authorization method can work as a final, but important checkpoint in the process, helping to prevent disputes and disgruntled (and potentially inebriated) customers.
With the payments and fraud elements of the IoT forming such a critical part of the path to profitability, telcos will benefit from working with expert partners that can provide a robust, cloud-based platform with ready access to a range of geographies and payment methods, along with pricing packages that are specifically geared for IoT – reflecting of the very specific nature of these transactions.
ACI has a wealth of experience working with telcos around the world and offers a specific IoT service that delivers against the ‘must-haves.’ If you would like to learn more, please contact Chris Curd or visit aciworldwide.com/telco.
Related Blog Posts
Success Speaks: Exploring the Future of Payments Collections in Auto-Finance with SAFCO
When it comes to improving collections, there’s one simple question your organization should ask before embarking on any type of payments project: what does “customer service” mean to our customers?
Success Speaks: UC San Diego Health Transforms Bill Payments to Improve Patient Satisfaction
Primum non nocere, “first, do no harm,” is a Latin maxim that serves as a fundamental principle of the medical community. Essentially, the phrase states that in some cases, it may be better to do nothing than to intervene. For UC San Diego Health, however, intervention was necessary to transform their billing and deliver an improved payments experience for their patients.
Instant and Digital: The Next Frontier of Bill Payment
We’d all like an inexpensive, simple and consolidated way to pay our bills, and we’re seeing a growing list of upstarts entering the market to meet this need. Customer interaction during the billing process is a critical touchpoint to maintain relationships and potentially enhance the customer experience, but third-party solutions that offer enhanced ease of use could get in the way. Companies need to respond with an engaging bill pay offering, which includes real-time payments.
Success Speaks: Blue Cross Blue Shield of Michigan Talks Meeting Member Demands in Healthcare
When looking for a payments success story in the world of healthcare, you’d be wise to turn your attention to the Great Lakes and the work done by Blue Cross Blue Shield of Michigan (BCBS MI). In a recent webinar with AHIP (America’s Health Insurance Plans) and ACI, Faran Farooqi, Strategic Capability Implementation and Operations for Blue Cross Blue Shield of Michigan, shared his insights into how his organization addressed the challenges of today to deliver a great payments experience for their members.
The 12 Biggest Security Threats to Payments
Consumers ask a lot of you in terms of convenience, speed and, above all, security. This puts the pressure on you to offer a pain-free consumer experience that is also highly secure. And when you accept payments, you need to secure all parts of your organization. Here’s an actual example: one major breach occurred when an air conditioning vendor was hacked, allowing hackers to access the corporate network and finally the point of sale network. This highlights the importance of understanding the threat landscape we face today.
High Incidence of Payments Data Theft is Driving Investment in Payments Technology
One in five organizations has experienced payments data theft over the last 12 months per new benchmark data, “2018 Global Payments Insight Survey: Bill Pay Services,” from Ovum.
4 Reasons Why You Must Future Proof Your Technology
What does future proofing your technology mean? In my view, it means preparing your bank to deliver the best customer experience possible--today and tomorrow. Research from Greenwich Associates indicates that the customer experience and ease of doing business are key drivers of loyalty. Extracting value from your technology investments so you can provide a superior customer experience is not only important because of the impact on service, but also on loyalty.
I want to focus on 4 reasons why future proofing your technology is important. These insights are a sneak preview into some of the findings from our upcoming whitepaper produced with Ovum, the annual Global Payment Insight Series.
A Master Class in Convenience: Faster Payments for Higher Education
Paying for college can be a real pain, and the act of paying tuition itself has not kept up to speed with the times.
According to Aite Group, 40% of tuition payments are made by ACH (electronic check), making it the most popular method of payment for higher education. Yet, these payments can sometimes take several days to process. In a world where college students send and receive over 120 text messages per day, immediacy is key. Especially when large dollar amounts are being spent. Students and parents demand that payment options conform to their expectations of speed, to prevent their accounts from being overdrawn.
A Prescription for Profitability: Real-Time Payments Come to Healthcare
When it comes to important numbers in the healthcare sector, you’re probably familiar with 120/80 (that’s ideal blood pressure for the non-medically inclined), but I’d like to introduce you to two more numbers: 15 and 47.
15 is the percentage of healthcare spending due to billing and payment inefficiencies, while 47 is the percentage of patients who would leave a hospital for a better payment experience1.
When Is Processing Payments in The Cloud More Secure?
Back when I started my career, “Jessie’s Girl” by Australian rocker Rick Springfield topped the charts, the federal funds rate was 20 percent and most organizations were reliant upon one or more mainframe computers that were hosted in an internal “computer room.”