M2M Security: Ensuring Device Security for the Internet of Things

March 1, 2016

The Internet of Things (IoT) is fast transforming the way people live and work, with new solutions appearing in various industries, ranging from connected cars to connected homes, cities and industries, all driven by advancements in machine-to-machine (M2M) communications. The billions of “things” that are connected in these M2M networks have the same security requirements as mobile phones, computing devices and consumer electronics devices. However, due to autonomous operation of M2M devices, there are additional security challenges that are not fully addressed by the current security management solutions used for mobile phones. This paper outlines the unique challenges relating to ensuring robust security of M2M devices.

Spotlight

Diablo Technologies

Founded in 2003, Diablo is at the forefront of developing breakthrough technologies for next-generation enterprise computing. Diablo's flagship Memory1 is a first-of-its-kind memory technology...

OTHER WHITEPAPERS
news image

Using eSIM and iSIM will save money for IoT deployments

whitePaper | June 22, 2022

Transforma Insights analysis points to an 8-13% saving to be made on lifetime connectivity spend by enterprises if they choose eSIM and iSIM options rather than removable plastic SIM cards for their IoT deployments. Embedded SIM (eSIM), and to a lesser extent its coming successor integrated SIM (iSIM), have established themselves as part of the range of capabilities that need to be carefully considered by an organisation when planning a cellular-based IoT solution. Alongside the physical components of eSIM and iSIM.

Read More
news image

Internet of Things (IoT) IoT on cloud – Enabling future of oil and gas industry

whitePaper | January 2, 2020

The ongoing improvement in cost and performance capabilities of computing, storage, bandwidth and software application has led to advancement in information, communication and connectivity technologies and triggered new waves of innovations. The Internet of Things (IoT) represents one major concept within these innovations that promotes the connection of everything in manifold contexts and industries. This includes connecting machines, facilities, fleets, network and even people to sensors and controls; feeding sensor data into advanced analytics applications and predictive algorithms; automating and improving the maintenance and operations of the machine and the entire systems.

Read More
news image

Establishing Confidence in IoT Device Security: How do we get there?

whitePaper | May 14, 2021

The purpose of this draft paper is to start a conversation about what it means to have confidence in the cybersecurity of IoT devices used by individuals and organizations and the various ways of gaining that confidence. This paper describes the landscape of confidence mechanisms that are currently available for establishing the security of IoT devices in the marketplace. In preparing this paper, NIST conducted extensive research on initiatives that can help to instill confidence in IoT device security and held a series of meetings with government and industry experts to glean information on the unique aspects and challenges in this space.

Read More
news image

Zero Trust Maturity Model

whitePaper | June 13, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More
news image

5G The Future of IoT

whitePaper | November 1, 2019

The Internet of Things (IoT) is transforming businesses and peoples’ lives, and will continue to ignite innovations in the future. It is expected that we will progress to tens of billions of connected devices globally over the next decade1 that will generate multi-trillion dollars of economic value2 across many markets forming the foundation of a totally interconnected world—or the Internet of Everything.

Read More
news image

IXON Cloud Security 2022

whitePaper | April 25, 2022

IXON provides a fully integrated cloud-based Industrial IoT solution for machine builders, building automation integrators and system integrators. The IXON Cloud platform together with a connectivity gateway, the IXrouter or third party devices with the IXagent software installed, o¬ers an all-in-one solution for safely and easily.

Read More

Spotlight

Diablo Technologies

Founded in 2003, Diablo is at the forefront of developing breakthrough technologies for next-generation enterprise computing. Diablo's flagship Memory1 is a first-of-its-kind memory technology...

Events