Top

Thales, G+D, ST Micro Lead eSIM Enablement Landscape

While Idemia, Valid and Truphone are fast-emerging enablers with growing reach, Workz and software-based eSIM providers Kigen and Oasis are this year’s dark horses in the eSIM enablement space

Seoul, Hong Kong, New Delhi, Beijing, London, Buenos Aires, San Diego – December 16, 2020

More than 6 billion eSIM (eUICC- and iUICC-based) capable devices will be shipped cumulatively over the next five years, according to the latest research from Counterpoint’s ETO (Emerging Technology Opportunities) Service. The uptake of eSIMs is poised to grow across a gamut of connected devices over the next decade, led by the flexibility, cost efficiency, security and other myriad benefits offered by the technology.

Commenting on the key eSIM technologies, Senior Analyst Karan Dasaor said, “The eSIM enablement space continues to hum with activity, with an array of companies offering eSIM solutions for diverse applications. These companies fall into three broad categories: 1) eUICC OS embedded in a hardware-based tamper-proof MFF2 or Wafer Level Chip Scale Packaging (WLCSP), miniaturized leadless package form-factors soldered into the PCBs; 2) Software-based eUICC in TEE (Trusted Execution Environment), sometimes called as soft-SIM or virtual SIM; 3) The relatively newer space of integrated UICCs, also called iSIM or iUICC, where the iUICC OS is integrated into a secure enclave within the System-on-Chip (SoC).”

“As it stands, only the hardware-based MFF2 and WLCSP form-factors are compliant with the security standards defined in GSMA’s SGPv.01/02/21/22 specs. Vendors engaged in supplying these chips are required to be GSMA SAS-UP (Security Accreditation Scheme for UICC Production) certified. Non-compliant proprietary software-based eSIM solutions (mostly iSIM and soft-SIM) are available from various ecosystem players, including component vendors, device manufacturers and operators. The iSIM is seeing a rising adoption, particularly in IoT applications, and is being evaluated to make it a part of GSMA specifications in future. On the other hand, the soft-SIM has seen greater adoption in markets such as China, within smartphones for international roaming services monetization by OEMs, and in IoT applications which are not that security-sensitive.”

Counterpoint has used its proprietary CORE (COmpetitive Ranking and Evaluation) framework to help the industry better understand and identify key players driving the thriving eSIM ecosystem. The deep-dive analysis and evaluation focuses on the relevant capabilities based on several interviews with different players. It showcases their strengths, ecosystem reach and several other criteria.

Companies such as Thales, G+D (Giesecke & Devrient), IDEMIA and VALID are the leading hardware-based eSIM enablement players integrating their GSMA-compliant eUICC OS into the MFF2/WLCSP chipsets supplied by the likes of ST Micro, Infineon and NXP. Players such as Truphone, Kigen (Arm spinoff), Oasis and RedteaMobile have also partnered with chipset players, module vendors, device OEMs and MNOs to offer eSIM and iSIM solutions expanding the supplier landscape.

Exhibit 1: eSIM Enablement CORE Scorecard and Analysis for Integrated Players

Counterpoint Research eSIM playersSource: eSIM Ecosystem – Opportunities, Trends, Evaluation, Analysis and Outlook, December 2020

Commenting on the competitive landscape, Research Vice-President Neil Shah said, “Conventional SIM card players Thales and G+D continue to lead the eSIM enablement race, driven by end-to-end secure GSMA certified eSIM solutions, technology contribution, diverse partnerships across the value chain and growing customer base. They are followed by IDEMIA and VALID in third and fourth spots respectively, scoring well across the board. Wuhan Tianyu, which is among the handful of Chinese vendors fully compliant with GSMA’s SAS-UP and SAS-SM certifications, has taken notable strides towards eSIM applications leveraging the IoT boom in China.”

Shah added, “The upstart eUICC players such as Kigen, Oasis and Workz are the dark horses looking to challenge the leaders with unique offerings, broadening partner and customer base with greater focus on IoT applications.”

Semiconductor companies such as STMicroelectronics, NXP and Infineon have been the key suppliers of secure hardware eSIM chipsets, partnering with the eUICC OS vendors as above and in some cases having own in-house integrated solutions. ST Micro, for instance, has seen a marked growth in its eSIM solution adoption for consumer and IoT deployments, whereas Infineon has been the key supplier for eSIM in mobility applications.

Commenting on the future evolution of eSIM form-factors, Research Director Dale Gai added, “Players such as Sony Semiconductor (Altair Semi), Sequans and Qualcomm have played a key role in driving iUICC implementations in partnership with different ecosystem players to bring iSIM solutions across IoT applications. As we move towards the iSIM era, players designing SoCs, from Qualcomm to MediaTek to Apple, will dominate and drive the integrated SIM capabilities within their chipsets, helping save board space, and have more control with the ability to scale across consumer, mobility and IoT applications.”

Exhibit 2: eSIM Enablement Scorecard Evaluation and Analysis for eSIM Hardware Enablement

Source: eSIM Ecosystem – Opportunities, Trends, Evaluation, Analysis and Outlook, December 2020

The comprehensive and in-depth report on “eSIM Ecosystem – Opportunities, Trends, Evaluation, Analysis and Outlook” is part of Counterpoint’s ETO Service.

Background:

Counterpoint Technology Market Research is a global research firm specializing in technology products in the TMT industry. It services major technology and financial firms with a mix of monthly reports, customized projects, and detailed analysis of the mobile and technology markets. Its key analysts are experts in the industry with an average tenure of 13 years in the high-tech industry.

Analyst Contacts:

Karan Dasaor

Dale Lai

  

 Neil Shah

 Counterpoint Research

press(at)counterpointresearch.com

Related Posts

Counterpoint research is a young and fast growing research firm covering analysis of the tech industry. Coverage areas are connected devices, digital consumer goods, software & applications and other adjacent topics. We provide syndicated research reports as well as tailored. Our seminars and workshops for companies and institutions are popular and available on demand. Consulting and customized work on the above topics is provided for high precision projects.

Term of Use and Privacy Policy

Counterpoint Technology Market Research Limited

Registration

In order to access Counterpoint Technology Market Research Limited (Company or We hereafter) Web sites, you may be asked to complete a registration form. You are required to provide contact information which is used to enhance the user experience and determine whether you are a paid subscriber or not.
Personal Information When you register on we ask you for personal information. We use this information to provide you with the best advice and highest-quality service as well as with offers that we think are relevant to you. We may also contact you regarding a Web site problem or other customer service-related issues. We do not sell, share or rent personal information about you collected on Company Web sites.

How to unsubscribe and Termination

You may request to terminate your account or unsubscribe to any email subscriptions or mailing lists at any time. In accessing and using this Website, User agrees to comply with all applicable laws and agrees not to take any action that would compromise the security or viability of this Website. The Company may terminate User’s access to this Website at any time for any reason. The terms hereunder regarding Accuracy of Information and Third Party Rights shall survive termination.

Website Content and Copyright

This Website is the property of Counterpoint and is protected by international copyright law and conventions. We grant users the right to access and use the Website, so long as such use is for internal information purposes, and User does not alter, copy, disseminate, redistribute or republish any content or feature of this Website. User acknowledges that access to and use of this Website is subject to these TERMS OF USE and any expanded access or use must be approved in writing by the Company.
– Passwords are for user’s individual use
– Passwords may not be shared with others
– Users may not store documents in shared folders.
– Users may not redistribute documents to non-users unless otherwise stated in their contract terms.

Changes or Updates to the Website

The Company reserves the right to change, update or discontinue any aspect of this Website at any time without notice. Your continued use of the Website after any such change constitutes your agreement to these TERMS OF USE, as modified.
Accuracy of Information: While the information contained on this Website has been obtained from sources believed to be reliable, We disclaims all warranties as to the accuracy, completeness or adequacy of such information. User assumes sole responsibility for the use it makes of this Website to achieve his/her intended results.

Third Party Links: This Website may contain links to other third party websites, which are provided as additional resources for the convenience of Users. We do not endorse, sponsor or accept any responsibility for these third party websites, User agrees to direct any concerns relating to these third party websites to the relevant website administrator.

Cookies and Tracking

We may monitor how you use our Web sites. It is used solely for purposes of enabling us to provide you with a personalized Web site experience.
This data may also be used in the aggregate, to identify appropriate product offerings and subscription plans.
Cookies may be set in order to identify you and determine your access privileges. Cookies are simply identifiers. You have the ability to delete cookie files from your hard disk drive.