SHARE
Facebook X Pinterest WhatsApp

Enterprises Failing to Secure M2M Transactions

Feb 25, 2014

Enterprises Failing to Secure M2M Transactions

M2M Transactions Expected to RiseM2M Transactions Expected to Rise

62% of organizations surveyed say that securing M2M transactions is important, and they expect to increase such transactions during the next 12 months.

Data Security Is Top Priority This YearData Security Is Top Priority This Year

96% of IT decision-makers say data security is a priority, whether it is intellectual property, trade secrets, corporate financials or customer data.

Compliance Drives InvestmentCompliance Drives Investment

Compliance supersedes M2M drivers, like efficiency gains or alignment to business priorities, but challenges exist.

Top Challenges to ComplianceTop Challenges to Compliance

48% of U.S. IT security decision-makers say implementing the proper controls is difficult. And 37% are unclear about the scope of compliance requirements.

So M2M Security Remains InadequateSo M2M Security Remains Inadequate

Few organizations appear to understand that security is an important component of data security strategy, according to the report.

M2M Seen as Merely Supporting ManufacturingM2M Seen as Merely Supporting Manufacturing

M2M is commonplace across numerous industries, however, for field-service requests, remote monitoring, logistics management, customer service and support, and it drives functions like billing, inventory management, backups, failover and disaster recovery.

Big Data Drives M2MBig Data Drives M2M

As enterprises deploy big data, they are becoming increasingly reliant upon it. Big data processes are built onto M2M authentication and data transfers.

Secure Shell Management LagsSecure Shell Management Lags

82% of respondents say they use Secure Shell (SSH) usually to transfer data from one machine to another and for administrator access control. But it can also be used to secure M2M transactions, like automated backups and application developer access to test systems.

Monitoring and Reporting Use of SSHMonitoring and Reporting Use of SSH

42% of organizations say they monitor and log activities of privileged users. 34% say they can generate reports on how many SSH keys are deployed and why.

Recommendation: Understand UsageRecommendation: Understand Usage

Cope with SSH sprawl by understanding how and where you use it. Start by learning SSH identities, trust relationships, users and administrators.

Recommendation: Treat Machine Identities Like User IdentitiesRecommendation: Treat Machine Identities Like User Identities

Ensure that your compliance and security can account for on boarding, off boarding, and monitoring of machine-based identities and credentials.

Recommendation: Look for SSH Usage PatternsRecommendation: Look for SSH Usage Patterns

This helps protect automated M2M transactions. The Internet of things will require improved security, especially the connections between devices and their interfaces.

Recommended for you...

Storage Vulnerabilities: The Neglected Cybersecurity Frontier
Drew Robb
Sep 7, 2022
NGFW vs UTM: Differences & Use Cases
Don Hall
Aug 12, 2022
Top Next-Generation Firewall (NGFW) Software
Jenna Phipps
Jul 19, 2022
Perimeter 81 vs NordLayer: Network Security Comparison
Devin Partida
Jun 24, 2022
CIO Insight Logo

CIO Insight offers thought leadership and best practices in the IT security and management industry while providing expert recommendations on software solutions for IT leaders. It is the trusted resource for security professionals who need to maintain regulatory compliance for their teams and organizations. CIO Insight is an ideal website for IT decision makers, systems integrators and administrators, and IT managers to stay informed about emerging technologies, software developments and trends in the IT security and management industry.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.