Security must be central to enterprise's M2M deployment, says Frost
Security must be a core component of an enterprise's deployment of machine-to-machine communications, advised Yiru Zhong, Frost & Sullivan senior industry analyst for information and communications technology.
The rapid adoption of M2M by enterprises opens them up to increased security risks because traditional M2M products do not have enough security built into them to satisfy future enterprise security requirements, according to Zhong.
"One of the common comments from these vendors when asked about enterprise adoption of more secure hardware in the lower levels of an M2M network is that current M2M deployments do not actually require a higher level of security. However, in future scenarios, security risks could be magnified or prevalent because of the way M2M applications will be delivered," Zhong said.
Greater use of the cloud will increase the security risks posed to enterprises by generic M2M architectures.
"In addition to the tremendous number of devices and objects that are going to be connected through communications networks, future M2M deployments will reach deeper into enterprise operations ... This will mean that enterprise M2M deployments could potentially be connected to other systems to enable a true connected society. The potential application of big data in such a setting will demand a well-defined risk analysis policy in terms of data security, trust, and privacy," commented Zhong.
M2M security was an issue also raised by Kathryn Weldon, a principal analyst for enterprise mobility at research firm Current Analysis, in a blog written earlier this year.
"If M2M grows the way the ecosystem hopes it will, there will be millions and even billions of end points sending continuous (as well as more sporadic) data across wired and wireless networks, including proprietary and mission-critical pieces of information about customers and businesses," observed Weldon.
Security is a particular concern for critical infrastructure industries, such as power generation, nuclear, and oil and gas, because they use M2M to operate critical functions.
Lack of standards, interoperability problems holding M2M back
M2M deployment to speed up enterprise mobility, survey finds
Current Analysis: M2M security worries mount as enterprise usage grows