Get Inspired


                          • 5G SIM

                            Definition & benefits of a 5G SIM for 5G virtualized networks

                            Trust is increasingly perceived as a pervasive transversal factor?to be added to virtualized 5G architecture in order to help to deliver the full 5G promises.

                            Learn more

                          • Read the Q&A: A first introduction to 5G technology and its uses cases

                            Introducing 5G technology – Characteristics and usages

                            The fifth generation networks (5G) is currently under development and will hit the market at the horizon 2020. Compared with the current 4G LTE technology, 5G is targeting to reach both high speed (1 Gbps), low power and low latency (1ms or less), for massive IoT, tactile internet and robotics

                            Introducing 5G technology – Characteristics and usages

                          • Silent authentication for a trusted, fluid & personalized consumer experience

                            Helped by powerful machine-learning systems, this technology helps build up a rich, multi-dimensional profile of each individual consumer. Behavioral biometrics and other context-based signals provide secure authentication for the ultimate in seamless consumer experiences.

                            Find out more with practical use cases

                          • Commercial drone

                            Cyber security for the commercial drone industry

                            Drone manufacturers and drone operators need to protect their assets and services, whereas public authorities need to ensure citizen safety and law enforcement. The commercial drone ecosystem needs trust at every stage, from drone manufacturing and deployment through to flights and post operations.

                            How to enable trust in the commercial drone ecosystem

                          • 5 factors for effective ID verification deployment

                            Automated ID verification service deployment, in-store: what systematic approach MNOs need to follow in order to fight ID fraud whilst achieving quick ROI.

                            Read more

                          • Why is strong ID verification critical for MNOs

                            Effective ID verification is key to tackling subscription fraud and its financial consequences. It is also more and more imposed by international and local regulations

                            Read more

                          • The role of MNOs within the European eIDAS regulation

                            The role of MNOs within the European eIDAS regulation

                            Find out why MNOS are ideally positioned to play a key role in electronic identification and trust services in the European digital market driven by eIDAS regulation

                            Read more

                          • 7 myths about Mobile NFC

                            Mobile NFC is now more diverse than ever and yet still raises some concerns. Don't wait any further, clear up 7 key concerns about mobile NFC!

                            Learn more