Security a core consideration in enterprise M2M strategy: Frost & Sullivan

Security has to be a prime consideration for enterprises that want to use M2M to achieve their business objectives, according to a new study from Frost & Sullivan.

“Traditional M2M deployments have security solutions embedded within the network, with the integrity of the underlying communications network being boosted by existing network security solutions,” said Yiru Zhong, a senior industry analyst with Frost & Sullivan.

Security has to be a prime consideration for enterprises that want to use M2M to achieve their business objectives, according to a new study from Frost & Sullivan.

“Traditional M2M deployments have security solutions embedded within the network, with the integrity of the underlying communications network being boosted by existing network security solutions,” said Yiru Zhong, a senior industry analyst with Frost & Sullivan.

While M2M players have traditionally embedded security in their products, and insisted that current M2M deployments do not require a higher level of security, the market-research company believes security risks could magnify in future because of the way M2M applications will be delivered.

Trends like cloud computing and big data, for instance, could affect the way security risks materialize, forcing enterprises to take necessary preventative steps as they rely increasingly on these technologies.

“Enterprise M2M deployments could potentially be connected to other systems to enable a true connected society,” said Zhong. “The potential application of big data in such a setting will demand a well-defined risk analysis policy in terms of data security, trust and privacy.”

ICT industry participants, as well as standardization and international bodies, are already working towards a viable and sustainable ICT framework for M2M progression, notes Frost & Sullivan, but must also consider the needs of enterprises and the behavior of digital citizens.

The work, however, should go a long way towards helping ICT participants define future security considerations and propose solutions.

“Since enhanced security will begin at the lower layers of M2M architecture, M2M modules manufacturers, connectivity providers and application enablement platform firms will all play important roles in the creation of a market leading portfolios and building a strong ROI business case for enterprises to deploy M2M,” said Zhong.