Enterprises Failing to Secure M2M Transactions
62% of organizations surveyed say that securing M2M transactions is important, and they expect to increase such transactions during the next 12 months.
96% of IT decision-makers say data security is a priority, whether it is intellectual property, trade secrets, corporate financials or customer data.
Compliance supersedes M2M drivers, like efficiency gains or alignment to business priorities, but challenges exist.
48% of U.S. IT security decision-makers say implementing the proper controls is difficult. And 37% are unclear about the scope of compliance requirements.
Few organizations appear to understand that security is an important component of data security strategy, according to the report.
M2M is commonplace across numerous industries, however, for field-service requests, remote monitoring, logistics management, customer service and support, and it drives functions like billing, inventory management, backups, failover and disaster recovery.
As enterprises deploy big data, they are becoming increasingly reliant upon it. Big data processes are built onto M2M authentication and data transfers.
82% of respondents say they use Secure Shell (SSH) usually to transfer data from one machine to another and for administrator access control. But it can also be used to secure M2M transactions, like automated backups and application developer access to test systems.
42% of organizations say they monitor and log activities of privileged users. 34% say they can generate reports on how many SSH keys are deployed and why.
Cope with SSH sprawl by understanding how and where you use it. Start by learning SSH identities, trust relationships, users and administrators.
Ensure that your compliance and security can account for on boarding, off boarding, and monitoring of machine-based identities and credentials.
This helps protect automated M2M transactions. The Internet of things will require improved security, especially the connections between devices and their interfaces.