Enterprises Failing to Secure M2M Transactions

By Karen A. Frenkel  |  Posted 02-25-2014 Email

Even though automated processes, called machine-to-machine (M2M) transactions, are overtaking human-to-computer transactions, M2M security is often overlooked, according to a new report by Forrester Consulting. M2M is used in applications such as billing, customer service and support, building automation, and digital signage. SSH Communications Security, inventor of the Secure Shell and SFTP protocols, commissioned the Forrester study, which surveyed 151 U.S. enterprise IT decision-makers in financial services, government, retail, manufacturing, utilities, business services and cloud service providers. The study found a "misalignment of security and compliance priorities placing organizations at risk." SSH CEO Tatu Ylonen says financial institutions, enterprises and government agencies "must take bold steps to elevate the scope and strength of their M2M security strategies if they are to prevent data theft and comply with industry standards." To read the full report, "The Rise of IT Automation and the New Security Imperatives: Growth in M2M Processes Requires a Fresh Approach to Security," click here.

Karen A. Frenkel writes about technology and innovation and lives in New York City.


Submit a Comment

Loading Comments...
Manage your Newsletters: Login Register