Home | Tech | As M2M use skyrockets to support “Internet of Things,” security not keeping pace

As M2M use skyrockets to support “Internet of Things,” security not keeping pace

By
Font size: Decrease font Enlarge font
As M2M use skyrockets to support “Internet of Things,” security not keeping pace

IT admins disagree on level of security, priorities and responsibility for remediation.

Every day, countless invisible machine-to-machine (M2M) transactions and processes power automation of critical business and operational processes across industries. However, even as automated processes become the dominant mode of computing – outstripping the traditional model of interactive human-to-computer transactions – M2M security is often overlooked or misunderstood.

A recent study undertaken by Forrester Consulting on behalf of security company SSH Communications Security found that the rise of M2M connections within data centers across industries has far outstripped the awareness of organizations about how best to secure them, resulting in a misalignment of security and compliance priorities that is placing organizations at risk.

"The rise of M2M connections within data centers across industries has far outstripped the awareness of organizations about how best to secure them."

Share this:

Some of the study’s key findings include:

Organizations expect to increase their volume of M2M transactions.

  • M2M processes are used by virtually all organizations, and sixty-two percent of organizations expect to increase their use of M2M processes over the next 12 months.
  • More than half of the financial institutions surveyed currently use M2M connections for billing.
  • Fifty percent of respondents currently use M2M for logistics management and customer service.
1 2 »
Join PRESIDENT&CEO on LinkedIn

Subscribe to comments feed Comments (0 posted)

total: | displaying:

Post your comment

  • Bold
  • Italic
  • Underline
  • Quote

Please enter the code you see in the image:

Captcha