What Is Zero Trust? A Guide to Securing IoT Connectivity
Learn what Zero Trust means for IoT security. Understand why traditional perimeter defenses fail connected devices and how Zero Trust principles protect your IoT infrastructure.
IoT vendor lock-in is a technical problem, not just a contract problem. Learn where it hides, what SIM technologies reduce it, and what to look for in a connectivity provider built for flexibility.
Most IoT deployments become locked to a single connectivity provider not through contract terms alone, but through technical architecture. The SIM hardware is single-profile. The management platform has no API. The data is siloed by device rather than pooled across a fleet. By the time the deployment scales to thousands of devices, the cost of switching has grown far beyond what was anticipated at procurement. Avoiding lock-in starts with knowing where it hides.
Vendor lock-in in IoT connectivity occurs when the technical or commercial structure of a deployment makes it difficult or prohibitively expensive to change providers. It takes four distinct forms.
1. Network dependency means your devices rely on a single carrier or carrier relationship for coverage. If that carrier underperforms in a region, you have no fallback.
2. SIM hardware portability refers to whether your SIM profile is tied to a single provider or whether it is designed to switch over the air. A SIM that requires physical replacement to change network profiles locks you to the current provider until you are willing to service every device in the field.
3. Management platform dependency is the form most organisations overlook. If your connectivity management platform holds your usage data, your SIM inventory, and your automation rules in a closed system with no export or API access, switching providers means starting from scratch operationally.
4. Commercial terms include volume commitments, per-country contracts, and minimum usage thresholds. These create financial lock-in even when the technical architecture is flexible.
Scale changes everything. Updating a software client on a laptop takes minutes. Replacing SIM cards in 10,000 field devices, whether sensors on an industrial site or meters in a utility network, is a logistics and cost problem that often runs into tens of thousands of euros before a single byte of data has moved to the new provider.
The other factor is time horizon. IoT devices are designed for long deployment cycles. A SIM installed in an industrial sensor today is expected to function for 10 years or more. The regulatory and network environment over that period will change. Providers will consolidate. Regulations in certain markets will restrict how foreign SIMs operate. An architecture built for flexibility on day one protects the investment over the full lifecycle.
If any of these apply, your current deployment has lock-in risk:
Your devices run on a single carrier profile with no network fallback. If coverage drops in one region, there is no automatic switch to an alternative carrier.
Your SIMs require physical access to change provider or profile. At scale, this is a field servicing cost.
Your connectivity management platform has no REST API and no data export capability. Your operational data is only accessible through your current provider's interface.
Your data plan is structured per SIM rather than pooled across your fleet. Individual SIM caps mean devices go offline even when the overall fleet has unused data.
Your commercial agreement includes minimum volume commitments or geographic restrictions that would require renegotiation to adjust.
Two technologies address network lock-in at the SIM level.
Multi-IMSI allows a single SIM to hold multiple carrier identities. In practical terms, the device connects to the strongest available network in a given market rather than a single pre-assigned carrier. When one carrier has an outage or degrades in a region, the device switches without manual intervention. This reduces dependency on any single carrier relationship.
eUICC (Embedded Universal Integrated Circuit Card) goes further. An eUICC-compliant SIM, governed by the GSMA SGP.02 standard for M2M devices, allows carrier profiles to be updated over the air without physically touching the device. For a fleet of devices in hard-to-reach locations, this is the difference between a software update and a field servicing project.
Together, Multi-IMSI and eUICC provide network-level portability. The SIM is no longer the constraint.
The table below describes what a lock-in-prone architecture looks like versus one built for flexibility. Use it as a procurement checklist.
| Area | Locks you in | Keeps you flexible |
| Network coverage | Single carrier per market, no redundancy | Multi-carrier access per market, automatic failover |
| SIM portability | Single-profile hardware SIM, requires physical swap | eUICC-compliant, profiles switchable over the air Data management |
| Data management | Per-SIM data caps, devices go offline when limits hit | Shared data pool across full fleet, no individual caps |
| Management platform | Closed dashboard, no API, data delayed 24-48 hours | Open API, real-time data, full CSV export |
| Contract terms | Volume minimums, per-country contracts, fixed commitments | SIM-level pause and unpause, no mandatory lock-in periods |
| Security architecture | Public internet routing, VPN clients required on devices | Private APN, Zero Trust, no client software needed |
A SIM operating on a foreign carrier in a country with permanent roaming restrictions will eventually be blocked. Countries including Brazil, Turkey, India, and China have regulations limiting how long a foreign SIM can operate on local carrier networks. A device deployed today on a roaming-only SIM faces disconnection when those restrictions are enforced.
The mitigation is a SIM architecture with local profiles. Multi-IMSI and eUICC-enabled SIMs allow the device to operate on a local profile that satisfies the country's requirements. This is not a feature relevant only at deployment. It is a compliance requirement for any device expected to operate in those markets over a multi-year lifecycle.
Most procurement teams do not factor permanent roaming restrictions into their initial evaluation. By the time the devices are deployed at scale, addressing the issue becomes an expensive rearchitecting exercise.
Yes, and it is the form of lock-in most commonly missed in procurement.
A connectivity management platform holds your SIM inventory, your network event logs, your automation rules, and your usage data. If the platform has no open API, extracting that data to migrate to a new provider is either impossible or a manual effort measured in weeks.
The other dimension is data freshness. Platforms built on reseller architectures typically deliver usage data with a 24 to 48 hour delay. This means your operational view of the fleet is always lagging. Real-time data access is only possible when the platform connects directly to the provider's own core network.
When evaluating a connectivity management platform, ask for: API documentation, data refresh rates, export capability for SIM inventory and usage history, and role-based access control for multi-team environments.
A flexible IoT connectivity architecture combines five elements.
A Multi-IMSI SIM with eUICC support gives the deployment network-level portability. Carrier profiles update remotely. No physical SIM replacement is required.
A shared data pool across the full fleet prevents individual devices from going offline due to SIM-level caps. High-usage and low-usage devices balance against the same allocation.
A private APN or Zero Trust network layer keeps device traffic off the public internet and routes it directly to cloud or on-premises destinations. This reduces security risk and data sovereignty exposure.
A connectivity management platform with real-time data access means operational data is portable. If you change providers, you take your data and your automation logic with you.
Commercial terms built around flexibility. No per-device minimum commitments, the ability to pause and reactivate SIMs without penalty, and no geographic contract segmentation.
IXT is built on this architecture. IXT Global SIM uses Multi-IMSI technology and eUICC across all form factors, with GSMA SGP.02 compliance. All SIMs share one data pool across 190+ countries. IXT CMP provides real-time fleet visibility. IXT SecureNet keeps device traffic on private infrastructure, and IXT Zero Trust extends Zero Trust security to cellular IoT and OT endpoints without requiring client software on the device.
IXT is a full MVNO delivering secure IoT connectivity across 600+ mobile networks in 190+ countries. IXT Global SIM uses Multi-IMSI technology and eUICC for remote profile switching across all form factors. IXT's Connectivity Management Platform provides real-time device visibility with no data delays. IXT Zero Trust, built on Zscaler ZTNA and Illumio, is the first solution to extend Zero Trust security to cellular IoT and OT endpoints without client software. IXT SecureNet provides private APN and VPN options for deployments where full Zero Trust is not required.
If you are evaluating IoT connectivity providers and want to understand what flexibility looks like in practice, explore the IXT Global SIM or speak to the team.
Related articles
Learn what Zero Trust means for IoT security. Understand why traditional perimeter defenses fail connected devices and how Zero Trust principles protect your IoT infrastructure.
VPNs were built for laptops, not IoT. Learn why VPN limitations create blind spots in IoT security and what secure remote access looks like for connected device fleets.
Learn how eSIM technology transforms IoT connectivity with remote provisioning, global coverage, and enterprise security.