<\/i>","library":"fa-solid"},"layout":"horizontal","toggle":"burger"}" data-widget_type="nav-menu.default">

Top

Colombia Telecom Meet Focuses on Digital Divide, 5G Launch

    • Colombian telecom operators and government are positive about the outcome of the 5G spectrum auction in December.
    • The government, telecom operators and regulatory bodies want to increase broadband penetration and provide training to Colombians to bridge the digital divide.
    • Telecom operators ETB and Claro shared their plans to leverage 5G to enhance verticals like education, mobility, and B2B services.
    Even asColombialooks forward to holding its first 5G auction in December this year, it has much more basic and long-pending telecom sector-related issues that need the attention of all stakeholders, whether the operators or government departments. It is with this in mind that representatives from the Colombian government, regulatory bodies, telecom operators and manufacturers gathered in the nation’s capital, Bogota, at the end of June for the Conecta Colombia summit. The event, which is a part of the series that Conecta Latam organizes in the region, saw discussions on regulation, technology and, of course, business. A team of analysts from Counterpoint was also present at the event. Here are their key takeaways:
    5G and connectivity expansionThe potential of 5G technology and its impact on various sectors were essential discussion topics at the event. Telecom operators ETB and Claro shared their plans to leverage 5G to enhance verticals like education, mobility, and B2B services. Investments in broadband and 4G were also emphasized as ongoing priorities alongside the imminent 5G auction. The discussions also recognized the need to focus on network coverage and connectivity expansion, ensuring that before the widespread adoption of 5G.
    Main 5G verticals to be developed in Colombia, including a $166 billion opportunity until 2035 as per Hugo Chang at Nokia.
    Security and digital transformation
    Bridging the digital divideAccording to the regulators, by the end of Q1 2023, Colombia had 9 million fixed broadband connections, which means that only approx. 61% of households in Colombia have access to fixed broadband. Highlighting Colombia’s digital divide, speakers at the summit emphasized the need to address challenges Colombians have such as lack of technical skills and connectivity. The government, telecom operators and regulatory bodies discussed strategies to increase broadband penetration, provide training to Colombians, involve regional stakeholders in the sector decision-making, and improve job formalization. The focus was on leveraging technology to narrow the digital divide and ensure equal access to digital opportunities.
    “Centros Digitales” at the core of the solution to bridge the digital divide. MinTic aims to reach 85% broadband penetration by 2031 compared to 61% in Q1 2023.
    5G and connectivity expansionThe potential of 5G technology and its impact on various sectors were essential discussion topics at the event. Telecom operators ETB and Claro shared their plans to leverage 5G to enhance verticals like education, mobility, and B2B services. Investments in broadband and 4G were also emphasized as ongoing priorities alongside the imminent 5G auction. The discussions also recognized the need to focus on network coverage and connectivity expansion, ensuring that before the widespread adoption of 5G.
    Main 5G verticals to be developed in Colombia, including a $166 billion opportunity until 2035 as per Hugo Chang at Nokia.
    Security and digital transformation
    During 2022 there were 20 billion failed cyberattacks in Colombia as disclosed by a Fortinet study, based on that government officials and telecom operators highlighted the importance of cybersecurity for the industry. Panel discussions emphasized the need for a national entity to coordinate carrier efforts and use artificial intelligence (AI) as a defensive tool. Besides, the event explored the concept of digital transformation withintelecomcompanies, with discussions revolving around employee training, customer experience and the transformation of big data into “mega data” facilitated by 5G. The role of alternative revenue drivers such as VoLTE and MVNO products were also highlighted as options before the 5G benefits come to play.
    扫罗Kattan,哥伦比亚的技术顾问presidency leads the panel discussion on the role of a national cybersecurity entity sponsored by the government.
    What is next?On August 1, the regulator will publish the first draft of the auction process, covering the mechanism to be followed and the required technical conditions for the applicants. The second draft will be released one month later and the final in October. In November and December, all the interested parties will submit their applications for the auction, which will start on December 20. 2024 can become the year of the 5G availability in the country.
    5G auction and 4G spectrum renovations chronogram.
    Bridging the digital divideAccording to the regulators, by the end of Q1 2023, Colombia had 9 million fixed broadband connections, which means that only approx. 61% of households in Colombia have access to fixed broadband. Highlighting Colombia’s digital divide, speakers at the summit emphasized the need to address challenges Colombians have such as lack of technical skills and connectivity. The government, telecom operators and regulatory bodies discussed strategies to increase broadband penetration, provide training to Colombians, involve regional stakeholders in the sector decision-making, and improve job formalization. The focus was on leveraging technology to narrow the digital divide and ensure equal access to digital opportunities.
    “Centros Digitales” at the core of the solution to bridge the digital divide. MinTic aims to reach 85% broadband penetration by 2031 compared to 61% in Q1 2023.
    5G and connectivity expansionThe potential of 5G technology and its impact on various sectors were essential discussion topics at the event. Telecom operators ETB and Claro shared their plans to leverage 5G to enhance verticals like education, mobility, and B2B services. Investments in broadband and 4G were also emphasized as ongoing priorities alongside the imminent 5G auction. The discussions also recognized the need to focus on network coverage and connectivity expansion, ensuring that before the widespread adoption of 5G.
    Main 5G verticals to be developed in Colombia, including a $166 billion opportunity until 2035 as per Hugo Chang at Nokia.
    Security and digital transformation
    During 2022 there were 20 billion failed cyberattacks in Colombia as disclosed by a Fortinet study, based on that government officials and telecom operators highlighted the importance of cybersecurity for the industry. Panel discussions emphasized the need for a national entity to coordinate carrier efforts and use artificial intelligence (AI) as a defensive tool. Besides, the event explored the concept of digital transformation withintelecomcompanies, with discussions revolving around employee training, customer experience and the transformation of big data into “mega data” facilitated by 5G. The role of alternative revenue drivers such as VoLTE and MVNO products were also highlighted as options before the 5G benefits come to play.
    扫罗Kattan,哥伦比亚的技术顾问presidency leads the panel discussion on the role of a national cybersecurity entity sponsored by the government.
    What is next?On August 1, the regulator will publish the first draft of the auction process, covering the mechanism to be followed and the required technical conditions for the applicants. The second draft will be released one month later and the final in October. In November and December, all the interested parties will submit their applications for the auction, which will start on December 20. 2024 can become the year of the 5G availability in the country.
    5G auction and 4G spectrum renovations chronogram.

    Nokia Phones Lead the Trust Rankings

    Counterpoint Research trust rankings are based on four pillars: software, security, build quality, and enterprise-recommended devices.

    • This is the second successive year where Nokia phones lead the global rankings in providing the fastest software and security updates with the highest share of portfolio recommended for enterprises.
    • Nokia phones lead across the price tiers in providing the fastest software and security updates; Nokia phones are also joint first in providing the latest software updates across their portfolio.
    • Nokia phones also lead in build quality by applying tougher tests than the industry average.

    Seoul, Hong Kong, New Delhi, Beijing, London, Buenos Aires, San Diego

    October 27th, 2020

    HMD Global, the home of Nokia phones, leads the Counterpoint Research 2020 trust rankings based on the four pillars of software, security updates, build quality, and devices recommended for enterprises. These pillars comprise various weighted criteria with a comparative analysis done for the leading Android smartphone brands. The findings are a part of Counterpoint Research’s latestwhitepapertitled “Nokia Phones Lead the Trust Rankings based on Software, Security Updates and Build Quality”

    Highlighting the whitepaper findings,VP &Research Director, Peter Richardson,noted, “TheCOVID-19pandemic has made the world even more digitally connected than before. With smartphones being devices that are always-on and connected, they are more vulnerable to cyberattacks which are growing both in frequency and severity. This makes software and security updates for Android smartphones an critical aspect. Due to the pandemic, there have been changes in thework environmentwith many more people working remotely. This situation calls for an enterprise-grade security solution for data security, to block malware, and to prevent things like phishing attacks. For thesecond year in a row, Nokia phones have topped our rankings in providing the most comprehensive software and security updates and it has the highest share of portfolio recommended for enterprise use. The performance of Nokia phones continues to be a competitive advantage over the rest of the smartphone brands in the Android ecosystem. 98% of Android smartphone brands still offer inconsistent software and security updates or none at all.OnePlusalso did well by providing faster software updates to all its devices currently selling in the market followed bySamsungandrealme.”

    Exhibit 1: Android OS Version Share within Key OEMs’ Portfolio

    Counterpoint WP Android OS Version Share within Key OEMs’ Portfolio
    Source: Counterpoint Research White Paper: “Nokia Phones Lead the Trust Rankings based on Software, Security Updates and Build Quality”

    * Models older than three years not considered, Android Go variants not a part of the study

    In a crowdedsmartphone market, every manufacturer is trying hard to differentiate its offering from its competitors. From design and build quality, to screen size and the number of cameras, a lot goes into this effort to differentiate. The software that the smartphone runs on is also an important consideration. Consumers should expect it to be updated regularly to ensure that potential security vulnerabilities are kept at bay and new features are delivered as they become available.

    Commenting on the performance of smartphone brands,Global Content Manager, Ritesh Bendre强调,“一些品牌专注于保持products up-to-date, while others only issue software and security updates after a considerable delay. Regular software and security updates helps not just the overall device experience, but also helps devices retain their value over time. Surprisingly, there are top 10 smartphone manufacturers that don’t have any clear strategy to inform customers whether their devices are eligible for security and software updates. We think this issue will become increasingly important as consumers keep their smartphones for longer and rely on them more. Nokia and OnePlus devices have done well here.”

    Exhibit 2: Security Patch Frequency Share for Top Manufacturers

    Counterpoint Security Patch Frequency Share for Top Manufacturers
    Source: Counterpoint Research White Paper: “Nokia Phones Lead the Trust Rankings based on Software, Security Updates and Build Quality”

    * Models older than three years not considered, Android Go variants not a part of the study

    Commenting on build quality results, Associate Director, Tarun Pathakcommented, “The build quality pillar was evaluated on several criteria including product robustness, force measurement, drop and impact, fatigue, wear and scratch, thermal tests, moisture and liquid tests, and others which included both qualitative and quantitative observations. We found that Nokia phones undergo tougher tests than the industry average. We therefore concluded that, when considered alongside the faster software and security updates the strong build quality means Nokia phones will last the test of time which is increasingly important at a time when global device replacement cycles are getting longer, now approaching 30 months.”

    Exhibit 3: Nokia Phones Go Through Tougher Tests Than Industry Average

    Counterpoint Nokia Phones Go Through Tougher Tests Than Industry Average
    Source: Counterpoint Research White Paper: “Nokia Phones Lead the Trust Rankings based on Software, Security Updates and Build Quality”

    Background:

    Counterpoint Technology Market Research is a global research firm specializing in Technology products in the TMT industry. It services major technology firms and financial firms with a mix of monthly reports, customized projects and detailed analysis of the mobile and technology markets. Its key analysts are experts in the industry with an average tenure of 13 years in the high-tech industry.

    For a free downloadable copy, click here:


    Analyst Contacts:

    Peter Richardson

    Tarun Pathak

    Ritesh Bendre

    Counterpoint Research
    press(at)www.arena-ruc.com

    Related Posts

    Podcast: The Future of IoT Security

    As theIoTecosystem continues to expand,securitycannot be neglected. This is especially true for devices that gather and store personal data. And while securing every computing system is almost impossible, service providers need to add a layer of security to thwart most attacks. There are four layers of security – hardware, software, network and cloud. But what challenges do companies face during deployment?

    In this episode of “The Counterpoint Podcast” host and VP of Research,Peter Richardsonand Research AnalystSatyajit Sinhadiscuss “The Future of IoT Security” with our guest, Kumi Thiruchelvam, CCO, Crypto Quantique. The discussion isn’t just limited to IoT Security, but we’ve also touched upon topics like Quantum Tunneling.

    Hit the play button below to listen to our podcast

    Also available for listening/download on:

    Related Posts

    Imoo leads the Global Kids' Smartwatch Market With 26% Market Share

    Seoul, Hong Kong, New Delhi, Beijing, London, Buenos Aires, San Diego

    April 7th, 2020

    China dominates kids’ smartwatch market with 62% of global shipments in 2019.

    Cellular connectivity included in 71% of global Kids Smartwatch shipments in 2019 driven by 4G connectivity

    Global kids’smartwatchshipments grew 8% year-on-year (YoY) in 2019, according to the latest research from Counterpoint’s IoT service.

    Commenting on the competitive landscape in the market, Counterpoint Research Analyst, Satyajit Sinha, noted, “Chinacontinues to dominate the global market for kids’ smartwatches accounting for more than three out of every five devices sold. It’s also Chinese brands such as Imoo and Huawei that lead in terms of vendor market share. These Chinese brands have further expanded to Southeast Asian countries like Indonesia, Thailand, and Malaysia. As a result of which the Asia Pacific region excluding China and India is the second-largest, with 11% of the global shipments.”

    Mr Sinha added further, “Operators also consider this segment attractive; there are significant net additions by operators likeChina Mobile,Vodafone,Verizon, AIS Thailand and Maxis in Malaysia. All have added kids’ smartwatches to their portfolios to boost new connections and additional revenue streams.”

    Exhibit: Global Kids Smartwatch Shipment by Brand Market Share in 2018 vs 2019

    Counterpoint Research Global kids smartwatch market

    Source: Global Smartwatch Shipment by Model Tracker 2019

    Commenting on kids’ smartwatch application, Counterpoint Senior Analyst, Ethan Qi, added, “Smartphones remain the best way to communicate. However, providing an expensive smartphone to a child is risky. The kids’ smartwatches are not only a communication device but also report a child’s location together with a history of movements. 71% of kids’ smartwatches shipped in 2019 werecellular. Hence, apart from calling, features like an SOS button for emergency communication, geofencing with SMS alerts on entry/exit, and the ability to hear what is happening next to the child, are possible. Among the cellular kids’ watches, 65% were 4G based, which opens the potential for video calling, educational interactive and other games.”

    Mr Qi further added, “Privacy and security are major challenges for the kids’ watch market. A few countries in Europe have been scrutinizing kids’ smartwatches with tracking features (GPS) due to security concerns. This is especially the case in the newGDPRenvironment. So, robust security and user experience will be key to success for this segment.”

    The comprehensive and in-depth report on “ Global Smartwatch by Model Quarterly Tracker Q1 2018- Q4 2019is a part of our IoT service. This report is available for downloadhere.

    Hit the play button below to listen to our podcast

    Background:

    Counterpoint Technology Market Research is a global research firm specializing in Technology products in the TMT industry. It services major technology firms and financial firms with a mix of monthly reports, customized projects and detailed analysis of the mobile and technology markets. Its key analysts are experts in the industry with an average tenure of 13 years in the high-tech industry.

    Analyst Contacts:

    Satyajit Sinha

    Ethan Qi

    Neil Shah

    Counterpoint Research
    press(at)www.arena-ruc.com

    How Secure is Working from Home?

    Coronavirus (COVID-19) continues to escalate and is increasingly wreaking havoc on daily life. Where China and South Korea are starting to get back to normalcy. Regions like Europe, India and the USA are being progressivelylocked-down.

    The main precaution that is required to flatten the infected rate curve is to implement social distancing techniques. This essentially requires people to remain isolated from others as much as possible, and for those that can, this means working from home (WFH).

    For several years, the ability to use smart devices and the widespread availability of broadband and Wi-Fi has made it easy for many to carry out regular tasks from home or points of Wi-Fi presence such as coffee shops. Progressive enterprises have adopted the potential for workers to access enterprise networks remotely – whether on an occasional or even permanent basis. However, many organisations have not taken this step, rightly concerned about the sensitivity andsecurityof enterprisedata.

    In the midst of the coronavirus lockdown, many companies are rushing to implement WFH policies. Having many employees suddenly working remotely is a major challenge for an organization and presents numerouscybersecurityissues.

    Threats to WFH:

    • Unsecured Wi-Fi networks:Most workers will be using local Internet providers’ routers – many of which are secured neither at the hardware nor at the network level. Every time an employee connects to their corporate network from an unsecuredWi-Fi network, they’re creating possible access points for cybercriminals to exploit.
    • Device security:As WFH has not been a conventional working culture in many organizations, most employees will have to use their own devices. These personal devices lack security tools, antivirus software and customized firewalls, which can increase the risk of malware andransomwareinjection both on personal devices and corporate servers/cloud.
    • A rapid increase in cybercriminal activity:The world’s priority is now focusing on personal safety and maintaining continuous business operations where possible. Consequently, attention on maximising cybersecurity can become a second-order priority. WFH leads to opening new attack vectors. Cybercriminals are leveraging the global panic and are increasing cyber scams and hacking attempts:
      • COVID-19 that is ransomware: An app that promises Android users can track coronavirus live cases and get alerts when someone nearby is diagnosed with the virus is tempting information. However, after installation a ransom note pops up on the screen “YOUR DEVICE IS ENCRYPTED: YOU HAVE 48 HOURS TO PAY 100$ in BITCOIN OR EVERYTHING WILL BE ERASED.”
      • COVID-19 map infected with ransomware: Cybercriminals are selling COVID-19 live interactive map as part of a Java-based malware deployment. The kit costs $200 to $700 (depending on the signing certificate). The user will likely share it with friends and family transmitting the ransomware.
      • Phishing attacks with coronavirus awareness:Cybercriminals keep track of the latest news to exploit it through phishing attacks. In the COVID-19 pandemic, a phishing attack was conducted on medical professionals. A link was sent through an email to join a mandatory seminar which was used to phish or capture the username and password of those working in hospitals.

    Cybercriminals are on alert for vulnerable users, if they can target medical professionals, they will target anyone. There are no new lows that cybercriminals won’t stoop to.

    Solutions and Precautionary measures:

    • Two-factor authentication (2FA) and two-step verification (2SV):A strong password is not enough. Additional steps need to be used to provide an extra layer of security. This could be an email or text message confirmation, a biometric method such as facial recognition or a fingerprint scan, or something physical, such as a USB fob.
    • Virtual Private Network (VPN):VPNs are sometimes used to bypass geographic restrictions on streaming sites and other location-specific content. They can also be used to improve online security as its unreadable to intercepts.
    • Anti-virus Software and firewalls: In addition to enabling built-in firewalls in internet routers and within devices’ own operating system, additional anti-virus software and third-party firewalls offer extra layers of security.
    • Secure Home router: Ideally, home owners should use a router withembeddedhardware security. But even changing the default password can be a good first step, followed by enabling encryption to WPA2 or WPA3.
    • Update and Patches:regularly update operating systems, anti-virus, and other software. These updates often include patches for vulnerabilities that have been uncovered.
    • Data Backup: Ideally, hardware backups will be the solution. However, opting forcloudback up services can also work.

    The WFH demands a more diligent and disciplined working culture from both employers and employees. Thinking twice before opening suspicious emails, regular system scanning when off duty and keeping an alert attitude can help this transition.

    Protecting data is the priority for every organization and adding strongsecuritymay be able to thwart most attacks. But securing everyvulnerabilityfully is almost impossible.

    As cyber-crime is also a business, criminals will always take the line of least resistance, applying multiple securitylayerswill make it more time consuming and costly for hackers meaning they’re more likely to move on to those that are less well protected.

    One-Third of Global Smartphones Sold in 2019 Had Embedded Hardware Security, Apple leads with 42% Market Share

    Seoul, Hong Kong, New Delhi, Beijing, London, Buenos Aires, San Diego

    Feb 12th, 2020

    Apple and Huawei implement embedded hardware security through a secure element (eSE/inSE). Samsung uses a physically unclonable function (PUF).

    Sales of smartphones with embedded hardwaresecurity(secure smartphones) grew 39% year-on-year (YoY) in 2019, according to the latest research from Counterpoint’s IoT Security Service. Systems based on a secure element accounted for 89% of shipments, while those with a PUF represented 10% of secure smartphone sales in 2019.

    Commenting on the importance of smartphone security, Counterpoint Research Analyst, Satyajit Sinha, noted, “Smartphone users are increasingly storing personal and professional data including digital banking, payment and financial information on smartphones. This attracts cyber attacks with victims losing real assets, such as money, personal data and loss ofprivacy. Securing smartphones should be a high priority for the smartphone industry.”

    Mr. Sinha added further, “Traditionally,mobile securitywas mostly aboutsoftwareapplications, however, with the increasedthreats, there is a need to secure hardware at one end and data at the other. There is a rising need for end-to-end security. Secure chipsets like secure elements, PUFs, and TPMs embedded in the smartphone are currently the best solution to meet increased security needs.”

    Exhibit 1: Global Smartphone Sales with Embedded Hardware SecurityMarket Share by Volume in 2018 vs 2019

    Counterpoint Research Global Smartphone Sales with Embedded Hardware Security Market Share by Volume in 2018 vs 2019

    Source: Counterpoint Research -Global Secure Smartphone Sales by Model Tracker 2019

    Commenting on the competitive landscape in the secure chipset market, Counterpoint Research Vice President, Research, Neil Shah, noted, “The secure element is a coprocessor within the SoC which assures tamper-resistance and is capable of securely hosting applications. From the iPhone 5s onwards, Apple has been embedding a secure enclave (eSE) provided by the Global Platform. The communication within the secure enclave and application processor is isolated, which secures data frommalwareattacks. Huawei also implemented an integrated secure element (inSE) on its SoCs, the HiSilicon Kirin 960, 970, 980, 990 and 710. Qualcomm has adopted the secure element as a secure processing unit (SPU) in the Snapdragon 845, 855 and 855+ which enables brands like Xiaomi, OnePlus, Oppo, Vivo, LG, Sony, Samsung and Google to implement hardware embedded security in its premium smartphones.”

    Mr. Shah further added, “Samsung implements a physically unclonable function (PUF), that serves as a unique identifier in the Exynos 9820 and 9825. Where Google takes a different approach by implementing a TPM (Trust Platform Module), a miniature version of a hardware security module (HSM) soldered into the PCBs of its Pixel series smartphones.”

    Exhibit 2: Global Smartphone Sales with Embedded Hardware Security by SoC Vendor, 2019 (Excluding TPM)

    Counterpoint Research Global Smartphone Sales with Embedded Hardware Security by SoC Vendor, 2019 (Excluding TPM)

    Source: Counterpoint Research -Global Secure Smartphone Sales by Model Tracker 2019

    The comprehensive and in-depth report on “Counterpoint Research -Global Secure Smartphone Sales by Model Tracker 2019is a part of our Security service. This report is available for downloadhere

    Background:

    Counterpoint Technology Market Research is a global research firm specializing in Technology products in the TMT industry. It services major technology firms and financial firms with a mix of monthly reports, customized projects and detailed analysis of the mobile and technology markets. Its key analysts are experts in the industry with an average tenure of 13 years in the high-tech industry.

    Analyst Contacts:

    Satyajit Sinha

    Neil Shah

    Peter Richardson

    Counterpoint Research
    press(at)www.arena-ruc.com

    Webinar: IoT Opportunities and Challenges in India and IoT Security

    Watch our Research Analyst,Satyajit Sinha,住在等电信网络研讨会在26日下午3.00 th November 2019. Clickhereto register for the webinar.

    Emerging markets like India can offer tremendous scale for IoT adoption but will likely be late followers compared to China in this path to connected everything. In this webinar, we’ll discuss the massive growth opportunity that remains in terms of cellular-IoT connections which could be a game-changer for India’s IoT market.

    Key points to be covered
    • Will India be a late adopter of IoT compared to China?
    • IoT introduction
    • IoT key application in India
    • Key challenges and roadblocks for IoT in India
    • Why IoT security is important and how to solve IoT security

    Who should attend
    • Telecom Industry Leaders
    • Service providers’ CXOs
    • IoT vendors
    • IoT device makers
    • Analysts
    • Government officials
    • Tax consultants

    Android Security Updates: An Important Element of Device Hygiene That Device Makers Often Miss

    Consumers store more personal data on smartphones than any other device. But many are unaware of how risky this can be. Few consumers in ourresearchmention regular security updates as a highly desirable feature. This may be because consumers assume that their smartphones will be updated, or that they don’t understand the implications of poor security. Or maybe it’s because attacks are relatively rare. But they can be highly disruptive when they do occur. Google is issuing regular Android security bulletins covering the security updates, which provides fixes for possible security issues affecting devices running on Android. Hence, updating devices regularly is one of the important ways to keep devices secure.

    Most of these vulnerabilities range from remote code execution, denial of service, and disclosing information. For example, Google has confirmed that it is fixing 193 Android security vulnerabilities with its Android 10 release through a default Android 10 patch. In the September Android security bulletin, Google has fixed more than 50 Android vulnerabilities, which included two critical ones while 12 were categorized under “high-severity”. As per Google, one of the critical vulnerabilities included in the media framework component that could enable a remote attacker using a special file to execute arbitrary code within the context of privileged process.This is just one example of how issuing regular security updates can help end consumers mitigating security-related risks on their Android devices.

    Google is addressing security and privacy-related risks through various other steps. Some of the initiatives include Project Treble and strengthening device partner agreements with mandated security updates, the most recent being Project Mainline. Project Mainline aims to bring more security updates to users faster than ever before. Google is working closely with device manufacturers to ensure smooth execution of Project Mainline. Currently, very few device makers are doing a good job on issuing regular security updates even though Android partners are notified of all security vulnerability issues at least a month before publication.

    As per our recent whitepaper titledSoftware and Security Updates: The Missing Link for Smartphones,among the top 10 smartphone makers, Nokia issues regular monthly security patches across its entire portfolio. Nokia is closely followed by Lenovo, which issues monthly security patches to most of its active models. Other leading brands including Xiaomi, Huawei, OPPO, Samsung, and Vivo, tend to issue security updates only quarterly. If we analyze further by price tier, the trend is similar to that of operating system updates. The sub-US$200 segment has the fewest security updates, whilepremium smartphonesfare better in getting regular updates.

    Exhibit 1: Security Patch Frequency Share for Top 10 Manufacturers

    Security Patch Frequency Share for Top 10 Manufacturers Source: Counterpoint Research White Paper: “Software and Security Updates: The Missing Link for Smartphones”

    To conclude, we believe that while issuing regular software and security updates are important, notifying users is also equally important. This should be undertaken widely – for example, on websites, and via social media. Consumers are tending to keep their smartphones for longer. And they tend to spend a little more when they do buy a new device. The average time consumers keep a flagship smartphone before buying a new device has been gradually extending. In markets as diverse asChina,Europe, and theUS, it is now approaching 30 months. Clearly, keeping the software and security up to date is important to ensure consumers continue to enjoy good performance and security throughout their ownership

    Nokia Leads the Global Rankings in Updating Smartphone Software and Security

    • Key brands had fewer than a third of their sub-US$200 smartphones updated to the latest Android version. Nokia leads with more than 90% of its devices updated in the price tier.

    • Only around a quarter of the top Android models are updated to the latest OS version.

    Seoul, Hong Kong, New Delhi, Beijing, London, Buenos Aires, San Diego

    August 30th, 2019

    Nearly 96% ofNokiasmartphones, sold cumulatively since Q3 2018, are already running onAndroidPie or have had an Android Pie update issued to them, making it the fastest brand to reach this level. This is according to the findings of Counterpoint Research’s latestwhitepapertitledSoftware and Security Updates: The Missing Link for Smartphones.

    We believe that device makers need to step up their efforts to provide regular software and security updates to their users. Except for Nokia and Lenovo, the performance of other device makers has been poor.Consumers开始保持更长时间的智能手机。They are also spending a little more when they do replace their devices. The average time that consumers keep a flagship smartphone before buying a new device has been gradually increasing. In markets as diverse asChina,Europe, and theUS, it is now approaching 30 months. Clearly, keeping the software and security up to date is important to ensure consumers continue to enjoy a good performance and have security throughout their ownership. Manufacturers that fail to take this into account when planning the timelines for offering support to their devices with updates are potentially failing their customers

    Highlighting the whitepaper findings,Research Director, Peter Richardson,noted, “Operating system and security updates are an aspect of Android smartphones that get relatively little attention. In our experience researching the industry, we have seen few brands focusing on this. And perhaps because manufacturers are not talking about it, consumer awareness is also low. It doesn’t appear among the ten features consumers say they care about most, in our research.”

    “Unsurprisingly, therefore, little effort is expended by the top manufacturers in focusing on regular updates to theoperating systemand device security, despite it being a critical element in the continued safe performance of the smartphone. Many of the key features including battery life,processor,cameraandmemoryare linked to the performance of the underlying operating system. We believe it is important to the overall consumer experience and is likely to become more widely recognized as such,”Richardsonadded.

    Exhibit 1: Android Version Share for Top 10 Manufacturers (Cumulative Sales)

    Android Version Share for Top 10 Manufacturers (Cumulative Sales)

    Source: Counterpoint Research White Paper: “Software and Security Updates: The Missing Link for Smartphones”

    Commenting on the performance of smartphone brands,Associate Director, Tarun Pathak, highlighted, “Among the top 10 smartphone makers, nearly 96% of Nokia smartphones, sold cumulatively since Q3 2018, are already running on Android Pie or have had an Android Pie update issued to them.Samsungclosely follows Nokia with 89% andXiaomiwith 84%. Xiaomi is good at ensuring its mid-price range products launch with the latest version of Android.”

    Pathakfurther added, “There are a lot of factors that play a role in issuing software updates. But some brands put much more effort into reducing the time lag from the release of the latest Android version to issuing the update to all their smartphones. Only a few brands commit to making sure their smartphones are always running the latest version. Nokia was the fastest brand in issuing the latest software updates covering 94% of its portfolio within a year of the launch of the latest Android version.”

    附表2:时间由十大制造商pgrade Portfolios to the Latest Android Version

    Time Taken by Top 10 Manufacturers to Upgrade Portfolios to the Latest Android Version; Nokia Leads

    Source:Counterpoint Research White Paper: “Software and Security Updates: The Missing Link for Smartphones”

    According toResearch Analyst, Abhilash Kumar, “High-priced devices经常更新,但在sof的最新消息吗tware is as important to mid- and low-priced products as it is to flagship devices. We, therefore, looked at manufacturers’ performance at updating software across all price tiers. By this analysis, Nokia stands out, again, as the brand most likely to update its full portfolio quickly. Xiaomi and Lenovo also rank high in this metric. Brands like Alcatel andTecnoare the laggards. This is because these brands have broad portfolios, mostly in the sub-US$200 segment, and the lifecycle of their models tends to be short. Their products often transition from launch to end-of-life in as little as six months, which means they have less incentive to provide long-term updates.”

    全面、深入白皮书”Software and Security Updates: The Missing Link for Smartphones” is available for download from our research portalhere

    Background:

    Counterpoint Technology Market Research is a global research firm specializing in Technology products in the TMT industry. It services major technology firms and financial firms with a mix of monthly reports, customized projects and detailed analysis of the mobile and technology markets. Its key analysts are experts in the industry with an average tenure of 13 years in the high-tech industry.

    Analyst Contacts:

    Peter Richardson

    Tarun Pathak

    Abhilash Kumar

    Counterpoint Research
    press(at)www.arena-ruc.com

    You can alsovisit our Data Section(updated quarterly) to view smartphone market shareGloballyand fromthe USA,ChinaandIndia

    Term of Use and Privacy Policy

    Counterpoint Technology Market Research Limited

    Registration

    In order to access Counterpoint Technology Market Research Limited (Company or We hereafter) Web sites, you may be asked to complete a registration form. You are required to provide contact information which is used to enhance the user experience and determine whether you are a paid subscriber or not.
    Personal Information When you register on we ask you for personal information. We use this information to provide you with the best advice and highest-quality service as well as with offers that we think are relevant to you. We may also contact you regarding a Web site problem or other customer service-related issues. We do not sell, share or rent personal information about you collected on Company Web sites.

    How to unsubscribe and Termination

    You may request to terminate your account or unsubscribe to any email subscriptions or mailing lists at any time. In accessing and using this Website, User agrees to comply with all applicable laws and agrees not to take any action that would compromise the security or viability of this Website. The Company may terminate User’s access to this Website at any time for any reason. The terms hereunder regarding Accuracy of Information and Third Party Rights shall survive termination.

    Website Content and Copyright

    This Website is the property of Counterpoint and is protected by international copyright law and conventions. We grant users the right to access and use the Website, so long as such use is for internal information purposes, and User does not alter, copy, disseminate, redistribute or republish any content or feature of this Website. User acknowledges that access to and use of this Website is subject to these TERMS OF USE and any expanded access or use must be approved in writing by the Company.
    – Passwords are for user’s individual use
    – Passwords may not be shared with others
    – Users may not store documents in shared folders.
    – Users may not redistribute documents to non-users unless otherwise stated in their contract terms.

    Changes or Updates to the Website

    The Company reserves the right to change, update or discontinue any aspect of this Website at any time without notice. Your continued use of the Website after any such change constitutes your agreement to these TERMS OF USE, as modified.
    Accuracy of Information: While the information contained on this Website has been obtained from sources believed to be reliable, We disclaims all warranties as to the accuracy, completeness or adequacy of such information. User assumes sole responsibility for the use it makes of this Website to achieve his/her intended results.

    Third Party Links: This Website may contain links to other third party websites, which are provided as additional resources for the convenience of Users. We do not endorse, sponsor or accept any responsibility for these third party websites, User agrees to direct any concerns relating to these third party websites to the relevant website administrator.

    Cookies and Tracking

    We may monitor how you use our Web sites. It is used solely for purposes of enabling us to provide you with a personalized Web site experience.
    This data may also be used in the aggregate, to identify appropriate product offerings and subscription plans.
    Cookies may be set in order to identify you and determine your access privileges. Cookies are simply identifiers. You have the ability to delete cookie files from your hard disk drive.