ChannelLife New Zealand logo
Industry insider news for New Zealand's technology resellers
Story image

EXCLUSIVE: Get the scoop on what eSIM tech means for NZ

By Ben Moore
Thu 7 May 2020
FYI, this story is more than a year old

Techday reached out to the biggest telecoms providers in Aotearoa New Zealand to gain a better understanding of how the up and coming eSIM (embedded SIM, not electronic SIM (@NZ Herald) technology changing the way Kiwi consumers and businesses connect.

What is an ‘eSIM’?

eSIM is an alternative to the traditional SIM cards that have been a source of frustration for many a person who has found themselves hunting for a paperclip to jab in that tiny hole on the side of their phone.

It is embedded within the phone’s hardware and can be encoded with a user’s phone number by their telecom provider. 

Unlike the pre-SIM era, this number can be changed at any time, meaning it is not permanently stuck with the phone.

In early-March, ABI Research said there is ‘no question’ that 2020 eSIM smartphone shipments will go over the 225 million milestone.

At the time, the technology research and consulting company projected 500 million eSIM-capable smartphones will ship globally in 2024.

What devices use eSIMs?

Many of the major smartphone manufacturers have begun including eSIM in their handsets.

Any iPhone from the XS and later includes the capability, including the latest release of the SE 

Samsung includes it in the Galaxy S20 and Galaxy Fold. 

Huawei includes it in the P40 and P40 Pro.

Google in the Pixel 3 and 3A range (although given Google’s history of support for NZ, I wouldn’t rush out to get one.)

These phones also support the traditional microSIM meaning they can switch between two different connections on one phone.

For the fans of more esoteric tech, the Motorola Razr relaunch uses eSIM exclusively.

More importantly, eSIM tech is used in many wearables, such as the Apple Watch, allowing cellular connectivity.

What the NZ telecom giants have to say

We reached out to 2degrees’ media team for comment but they had not replied as of the publication of this article.

While Spark is the only provider that currently supports eSIM, Vodafone has announced that it will be adding support on its network around the middle of this year. 2degrees has made no announcements or comments on the topic.

A Spark representative, corporate relations partner Elle Dorsett, says that there has already been a rise in popularity.

“We are seeing steady growth of customers picking up eSIM. Launching the Apple Watch Series 5 (wearables) definitely gave it a boost. We would expect to see this rise further as more suppliers launch eSIM capable devices,” Dorsett says.

Vodafone NZ wholesale and infrastructure director Tony Baird says that the rollout of 5G will be the real driver of eSIM tech.

“While there is eSIM capability and features in the 4G environment, which will be supported when we begin rolling out eSIMs, we strongly believe 5G will bring to life the true potential of wearables and dual-SIM devices, so we are focusing on supporting the technology of the future,” Baird explains.

“Already we have seen these trends in other markets, with 5G helping drive the transition of wearables and dual-SIM devices from the early adopter to the mainstream consumer. We expect eSIM will be particularly popular with business people, customers who have a work and personal number, and wearable users.”

Dorsett echoes Baird’s comment that business users are the key driver of eSIM tech stating, “The most obvious (use-case) for business is dual sim – 1 line for personal / 1 line for business on the same device.”

But handsets are not the only place where the tech will find its feet.

“Another example where eSIM functionality could be useful is when seamless network access across different geographic locations is needed, in sectors such as fisheries,” Baird says.

“We expect to see massive growth in cellular-enabled devices over the coming years, bringing to life the internet of things (IoT). The combination of 5G and eSIM will help deliver smarter machine-to-machine performance, as more sensors will have cellular data, helping to enable greater automation.”

In layman’s terms, if you want to have a lot of devices across a huge area gathering information and talking to each other in near-realtime, having eSIM tech on a 5G network will let that happen.

However, as Spark rep Dorsett points out, eSIM is not the end-game for the development of SIM technology.

“In relation to IoT eSIM (eUICC) there is very high interest in the technology but very slow adoption which is to be expected given some of the complexity involved,” she says.

eUICC (embedded universal integrated circuit card) is an eSIM that also allows for the storage of data that relates to the account – similar to how a physical SIM can store contact details, a feature the eSIM doesn’t have.

“Industrial IoT (coming out of NZ business) are still using embedded SIMs, it takes time to alter devices, a supply chain implications associated with using eUICC. At the same time, we have the next generation iSIM making a lot of noise in the market which will equally be of interest, but regardless of eUICC or iSIM the underlying functions of localisation will still be same in both models and will be utilised into the future.”

An iSIM (integrated SIM) is actually integrated into the SoC (system on a chip, basically the processor chip) not just the circuit board, and so is more secure and removes the need for dedicated SIM space.

With all the benefits and potential that eSIM offers, it is no surprise that Vodafone is keen to get the tech moving as soon as it can.

“We are working on bringing eSIM to our customers as quickly as possible. Our aim is to provide a competitive solution for both business customers and consumers as we know eSIM functionality will become even more important in the years to come,” Baird says.

Whether you have the need for two numbers, want to connect your smartwatch to a network, roll out an entire network of connected devices, or simply get rid of that pesky physical SIM card, eSIM seems poised to usher in the next phase of connectivity to Kiwis.

Keep an eye on any eSIM news by checking out tagged stories that come out of the Techday network of sites.

Related stories
Top stories
Story image
Cybersecurity
What every CISO must answer to enable a best-in-class security operations program
It has been widely reported recently that South Australian government employees have been the victims of a cyberattack.
Story image
Identity and Access Management
The post-pandemic workforce requires secure IAM capabilities
HID Global discusses what identity and access management means for organisations in today's convoluted digital world.
Story image
Microsoft
Microsoft previews Power Platform website design offering
Microsoft has announced the preview of Power Pages, the fifth product in its Power Platform family, designed for low-code makers and professional developers.
Story image
Dynabook
Dynabook refreshes Portégé X30L series with the Portégé X30L-K
The new model contains hybrid-architecture Intel 12th Gen Core P-Series 28W processor options, Wi-Fi 6E, along with Intel Iris Xe graphics.
Story image
Red Sift
Entrust expands strategic partnership with Red Sift
Entrust has expanded its strategic partnership with Red Sift to make it easier for businesses to adopt Brand Indicators for Message Identification (BIMI) standards for email identification and security.
Story image
Cybersecurity
Noname Security partners with Netpoleon to target API issues
Specialist API security firm Noname Security has appointed Netpoleon as its distributor in Australia and New Zealand.
Story image
Microsoft
New Relic enters multi-year partnership with Microsoft Azure
New Relic has announced a strategic partnership with Microsoft to help enterprises accelerate cloud migration and multi-cloud initiatives. 
Story image
Phishing
WhatsApp and QR codes the next scam threat - report
KnowBe4 has warned it expects to see an increase in QR Codes and the WhatsApp chat platform being used for phishing and other scams. 
Story image
Phishing
Vishing attacks reach all time high - Agari and PhishLabs
"Hybrid vishing campaigns continue to generate stunning numbers, representing 26.1% of total share in volume so far in 2022."
Story image
GapMaps
GapMaps Live to improve brand decisions on physical locations
GapMaps has released its latest service GapMaps Live, giving more insights and features to help brands make better decisions about physical locations.
Story image
Vodafone
Vodafone NZ buys remaining stake in retail joint venture
Vodafone New Zealand has purchased the remaining 50% stake in the specialist joint venture (JV) with private equity company Millennium Corp.
Story image
SaaS
Maintaining secure systems with expectations of flexible work
Most office workers feel they've proved they can work successfully from home, and as much as employers try, things aren't going back to the way they were anytime soon.
Story image
Microsoft
Global cybersecurity insurance market worth $11.5b this year
Future Market Insights finds the cybersecurity insurance market is expected to reach USD$11.5 billion in 2022, growing to $61.2 billion in 10 years.
Story image
Digital Transformation
Pluralsight and Ingram Micro Cloud team up on cloud initiative
Pluralsight has teamed with Ingram Micro Cloud to build upon cloud competence and maturity internally, and externally support partners’ capabilities.
Story image
Cybersecurity
Cybersecurity prompts upgrade for 1.3 billion electricity meters
ABI Research finds Advanced Metering Infrastructure (AMI) and cybersecurity concerns are prompting the upgrade of 1.3 billion electricity meters by 2027.
Story image
Ransomware
Alarming surge in Conti Ransomware Group activity - report
A new report has identified a 7.6 per cent increase in the number of vulnerabilities tied to ransomware in Q1 2022.
Story image
Ransomware
Employees on the frontline of cyber defense - report
In the first quarter of 2022, employees found themselves more than ever at the frontline of cyber defense, according to a new report from Kroll. 
Story image
Wireless
Hands-on review: Technics EAH-A800 Noise Cancelling Wireless Headphones
Designed in Osaka, Japan, these headphones just exude quality. They aren’t heavy, but they feel well built and solid.
Story image
Cybersecurity
Comcast to use ThreatQuotient for cybersecurity operations
Comcast, the parent company of NBC Universal and SKY Group, has chosen ThreatQ Platform and ThreatQ Investigations to meet their cybersecurity needs.
Story image
Digital Signage
MAXHUB's Digital Signage range to bolster boardroom productivity
The new MAXHUB Digital Signage technology is purpose-built to make every kind of team meeting more effective.
Story image
Surveillance
i-PRO releases smallest AI-based surveillance camera on the market
The new i-PRO mini network camera is now available, with a pocket-sized form factor and full AI analytics functionality.
Story image
Malware
'Alarming' rise in ransomware threats - Verizon report
As criminals look to leverage increasingly sophisticated forms of malware, it is ransomware that continues to prove particularly successful.
Story image
Training
Delinea enhances partner experience with new training initiatives
Delinea has announced a range of training and certification initiatives to help scale the capacity of VARs, System Integrators, MSPs and MSSPs to meet the demand for PAM solutions.
Story image
Data Protection
Information management capabilities to meet privacy requirements
Organisations with customers or operations across more than one country face a spate of new and proposed privacy and data protection laws.
Story image
Microsoft
Elevation of Privilege the top 2021 Microsoft vulnerability
BeyondTrust has released its 2022 Microsoft Vulnerabilities Report, finding that Elevation of Privilege is the top vulnerability category for the second consecutive year.
Story image
Gaming
Hands-on review: WD_Black SN770 NVMe SSD Game Drive
Western Digital expands its WD_Black range of NVMe solid-state drives with the WD_Black SN770 Game Drive.
Story image
Sift
Sift shares crucial advice for preventing serious ATO breaches
Are you or your business struggling with Account Takeover Fraud (ATO)? One of the latest ebooks from Sift can provide readers with the tools and expertise to help launch them into the new era of account security.
Booster
Booster Innovation Fund. A fund of Kiwi ingenuity – for Kiwi investors.
Link image
Story image
Ransomware
CERT NZ releases first Cyber Security Insights for 2022
CERT NZ has released Quarter One: Cyber Security Insights 2022, which offers an overview of reports about cybersecurity incidents affecting New Zealanders.
Story image
ChildFund
ChildFund launches new campaign to protect children online
ChildFund says WEB Safe & Wise aims to protect children from sexual exploitation and abuse online while also empowering them to become digitally savvy. 
Story image
BYOD / Bring Your Own Device
How zero trust can lead the battle against ransomware
SecOps teams champion a zero trust strategy to support the fight against the escalating risk of cybercrime and help monitor threat actors across a network.
Story image
Vectra AI
Vectra’s inaugural Partner of the Year Awards revealed
APAC companies Baidam, Firmus, ShellSoft and Macnica have been recognised in Vectra AI's inaugural Partner of the Year Awards.
Story image
Sony
Sony launches LinkBuds S - the latest model in the series
Sony says the LinkBuds S will give users a unique sound experience through sensor and spatial sound technology, even in AR games.
Story image
Cybersecurity
Asia Pacific plagued by sophisticated bad bots - report
The three most common bot attacks were account takeover, content or price scraping, and scalping to obtain limited-availability items.
Story image
Silver Peak
The path to an adaptive, modern network
Managing and securing the network looks different than it did just two years ago—especially given that most of these networks are made up of multi-generations of infrastructure stitched together over time.
Story image
Manhattan Associates
Shortening the click-to-customer cycle through smart technologies
Speed of delivery without accuracy is a dealbreaker for consumers. How can retailers operating in an omnichannel environment overcome the challenge of click-to-customer cycle times.
Story image
Digital Marketing
Similarweb acquires SEO and rank tracking company Rank Ranger
Digital intelligence company Similarweb, which specialises in analysing web traffic, has acquired Rank Ranger, a market leader in SEO and rank tracking.
Story image
Getac
Getac and Optalert expand partnership to promote industrial safety
Getac’s ZX70 Android tablets will be used to support Optalert’s Eagle Industrial early-warning drowsiness detection system for use in mining and transportation.
Story image
Training
Infosec unveils role-guided cybersecurity training roadmaps
Infosec Skills Roles maps hands-on training and certifications to the 12 most in-demand cybersecurity roles to maximise training efficiency.
Story image
Vectra AI
Understanding the weight on security leader’s shoulders, and how to shift it
Millions of dollars of government funding and internal budgets are being funnelled into cybersecurity to build resilience against sophisticated threats, indicating how serious this issue has become.
Story image
Omnichannel
Lexmark launches A/NZ first with retail publishing solution
Lexmark, a global imaging and IoT solutions leader, launched its Publishing Platform for Retail (PPR) in Australia and New Zealand.
Story image
Ransomware
APAC ranks third-highest region targeted by ransomware
Asia Pacific has ranked the third-highest region globally to be targeted by ransomware, according to cybersecurity firm Group-IB.
Story image
Hybrid Cloud
Barracuda expands cloud-native SASE platform
"The expansion of Barracuda's cloud-native SASE platform for hybrid deployment models and IIoT environments solves a number of challenges."
Story image
Amazon Web Services / AWS
RedShield leverages AWS to scale cybersecurity services
"Working with AWS gives RedShield the ability to mitigate significant application layer DDoS attacks, helping leaders adopt best practices and security architectures."