Enterprises Failing to Secure M2M Transactions

 
 
By Karen A. Frenkel  |  Posted 02-25-2014 Email Print this article Print
 
 
 
 
 
 
 
 
 
  • Previous
    M2M Transactions Expected to Rise
    Next

    M2M Transactions Expected to Rise

    62% of organizations surveyed say that securing M2M transactions is important, and they expect to increase such transactions during the next 12 months.
  • Previous
    Data Security Is Top Priority This Year
    Next

    Data Security Is Top Priority This Year

    96% of IT decision-makers say data security is a priority, whether it is intellectual property, trade secrets, corporate financials or customer data.
  • Previous
    Compliance Drives Investment
    Next

    Compliance Drives Investment

    Compliance supersedes M2M drivers, like efficiency gains or alignment to business priorities, but challenges exist.
  • Previous
    Top Challenges to Compliance
    Next

    Top Challenges to Compliance

    48% of U.S. IT security decision-makers say implementing the proper controls is difficult. And 37% are unclear about the scope of compliance requirements.
  • Previous
    So M2M Security Remains Inadequate
    Next

    So M2M Security Remains Inadequate

    Few organizations appear to understand that security is an important component of data security strategy, according to the report.
  • Previous
    M2M Seen as Merely Supporting Manufacturing
    Next

    M2M Seen as Merely Supporting Manufacturing

    M2M is commonplace across numerous industries, however, for field-service requests, remote monitoring, logistics management, customer service and support, and it drives functions like billing, inventory management, backups, failover and disaster recovery.
  • Previous
    Big Data Drives M2M
    Next

    Big Data Drives M2M

    As enterprises deploy big data, they are becoming increasingly reliant upon it. Big data processes are built onto M2M authentication and data transfers.
  • Previous
    Secure Shell Management Lags
    Next

    Secure Shell Management Lags

    82% of respondents say they use Secure Shell (SSH) usually to transfer data from one machine to another and for administrator access control. But it can also be used to secure M2M transactions, like automated backups and application developer access to test systems.
  • Previous
    Monitoring and Reporting Use of SSH
    Next

    Monitoring and Reporting Use of SSH

    42% of organizations say they monitor and log activities of privileged users. 34% say they can generate reports on how many SSH keys are deployed and why.
  • Previous
    Recommendation: Understand Usage
    Next

    Recommendation: Understand Usage

    Cope with SSH sprawl by understanding how and where you use it. Start by learning SSH identities, trust relationships, users and administrators.
  • Previous
    Recommendation: Treat Machine Identities Like User Identities
    Next

    Recommendation: Treat Machine Identities Like User Identities

    Ensure that your compliance and security can account for on boarding, off boarding, and monitoring of machine-based identities and credentials.
  • Previous
    Recommendation: Look for SSH Usage Patterns
    Next

    Recommendation: Look for SSH Usage Patterns

    This helps protect automated M2M transactions. The Internet of things will require improved security, especially the connections between devices and their interfaces.
 

Even though automated processes, called machine-to-machine (M2M) transactions, are overtaking human-to-computer transactions, M2M security is often overlooked, according to a new report by Forrester Consulting. M2M is used in applications such as billing, customer service and support, building automation, and digital signage. SSH Communications Security, inventor of the Secure Shell and SFTP protocols, commissioned the Forrester study, which surveyed 151 U.S. enterprise IT decision-makers in financial services, government, retail, manufacturing, utilities, business services and cloud service providers. The study found a "misalignment of security and compliance priorities placing organizations at risk." SSH CEO Tatu Ylonen says financial institutions, enterprises and government agencies "must take bold steps to elevate the scope and strength of their M2M security strategies if they are to prevent data theft and comply with industry standards." To read the full report, "The Rise of IT Automation and the New Security Imperatives: Growth in M2M Processes Requires a Fresh Approach to Security," click here.

 
 
 
 
 
Karen A. Frenkel writes about technology and innovation and lives in New York City.

 
 
 
 
 
 

Submit a Comment

Loading Comments...
 
 
 
 
 
 
 
Thanks for your registration, follow us on our social networks to keep up-to-date