Expert Opinion: The business case for security enabled communication

As more products become connected they are also exposed to potential ‘hacking’ attacks, fraud or misuse. Hence, as Stephen Bryant writes, improving privacy, integrity and security becomes a critical part of an M2M service deployment programme.

 

One of my favourite quotations is Henry David Thoreau’s, “Men have become the tools of their tools.” As a technologist and firm believer that technology can bring a multitude of benefits for businesses and consumers, I’m also a skeptic as more often than not product and service offerings are shaped around the often awkward mix of technology and suppliers, which comprise the key building blocks of many of our customers’ offerings.

In my view, it is the product or service offering that should shape how the technology is delivered. At Telenor Connexion we pride ourselves on customer service and the ability to help our customers get their offerings to market, and we’re now turning our eyes towards the total business case around security as an area where we can help our customers simplify their connectivity strategy and increase security levels.

The de facto M2M set-up for connectivity involves both a private APN and VPN for security which at present is viewed as a basic and uninteresting M2M hygiene factor. But we believe it is time to look past these as the primary means of securing connectivity, so that we can help customers turn security into a solution which helps them reduce their costs, allows for additional revenue channels and provides them with more flexibility in their overall connectivity strategy. And most importantly raises the level of security from the APN and VPN set-up provided by today’s technology. So how do we achieve these ambitious aspirations?

Protection from data dangers

Security as it is traditionally presented is a ‘must have’ hygiene factor to protect your data from the dangers that are lurking out there. Indeed, there have been a number of security-related incidents involving M2M devices – but from experience I don’t like to make decisions motivated purely by fear. I also want to reduce complexity, see savings where possible and have the security support the business going forward. To these ends we have introduced our embedded Security Enabled Communications (eSEC) service, which enables end-to-end encryption all the way from the M2M device through any connectivity channel to a security gateway. This is effectively ‘over the top’ of any communications technology and sees the need for APNs and VPNs removed.

We believe this is important as most business offering services using M2M have multiple connectivity providers and may also rely on tether devices such as smartphones. The operational overhead and costs for these various security methods is then reduced by using a single end-to-end encryption solution. And by reducing the complexity of a number of security setups the overall security level is increased.

Stephen Bryant, CTO of Telenor Connexion
Stephen Bryant has worked with Telenor Connexion since 2010. He is responsible for Telenor Connexion’s technology and operations including customer service. Stephen worked for over 10 years across the Occident delivering large scale IT and Telecoms solutions in many verticals whilst working for systems integrators such as Logica, Fujitsu Services and BearingPoint – solutions including Telenor Connexion’s M2M platform.

Secure Walled Garden

Having an end-to-end security solution also means a Walled Garden where content, applications, payments and other services can securely be made available to open new revenue possibilities.

To accomplish this there are four key criteria – banking grade security, lightweight encryption methods, open roadmap and manageability. All are addressed in the eSEC service. We use accepted and internationally recognised encryption suites and methods, which only add a few bytes of overhead to every packet. We provide a managed service and support products which have a supported and maintained roadmap.

Moreover, the eSEC services are not limited to use with Telenor Connexion’s SIM or connectivity, meaning all IP and SMS connectivity can be secured regardless of supplier of connectivity channel. As important as the technology, we provide a full managed security service providing alarms, reporting and 24/7 surveillance and service desk that is ready to act!

This holistic approach of achieving end-to-end security in M2M solutions helps customers reduce complexity, increase security and simplify M2M.

RECENT ARTICLES

Aeris to acquire IoT business from Ericsson

Posted on: December 8, 2022

Ericsson and Aeris Communications, a provider of Internet of Things (IoT) solutions based in San Jose, California, have signed an agreement for the transfer of Ericsson’s IoT Accelerator and Connected Vehicle Cloud businesses.

Read more

Telenor IoT passes milestone of 20mn SIM cards

Posted on: December 8, 2022

Telenor, the global IoT provider and telecom operator, has experienced rapid growth over the last years and ranks among the top 3 IoT operators in Europe and among the top IoT operators in the world. The positive development is due to an accelerated pace of new customers combined with a successful growth of existing customers’

Read more
FEATURED IoT STORIES

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption, is leading the charge to dominate the next decade’s discussion around business IT. Below, we’ll discuss the current boom, what’s driving it, where it’s going,

Read more

Talking Heads: The M2M Doctor is in the House

Posted on: December 26, 2013

Mobile health is M2M at its most rewarding. So says, Dan MacDuffie CEO of Wyless (left). And he should know, his managed services company has achieved 50% yearon- year growth recently and a growing portion of that is in mHealth and Wellness services. He’s certain we’re standing on the threshold of a new generation of health services that cut delivery costs, extend the reach

Read more

Talking Heads: mHealth gains ground as one-stop shops and M2M with ‘wired safety net’ bring efficient patient monitoring

Posted on: December 23, 2013

For years analysts have touted mobile healthcare as a huge opportunity for those offering machine-to-machine communication (M2M) services. Truth be told, the progress so far has been patchy, at best. So M2M Now asked Alexander Bufalino, SEVP Global Marketing at Telit, to describe the hurdles in the way of M2M mHealth, how they are now being overcome and what

Read more

Unlocking the total value of M2M

Posted on: December 19, 2013

Do you ever wonder why people and organisations invest in machine-to-machine communications (M2M) and the Internet of Things (IoT), asks Fred Yentz? Reasons may differ somewhat across industry segments but in most cases they fall in one or more of three categories: To make money, to save money or to be compliant. ILS Technology is squarely focused on helping

Read more

Paving the way to the Internet of Things

Posted on: December 17, 2013

Combining the ARM computing engine with location-awareness and wireless connectivity It’s set to be the Perfect Storm: The rapid growth of high-speed cellular networks and the introduction of IP version 6 which has enough IP addresses for every grain of sand on Earth. Add to this mix the proliferation of the ARM embedded computing architecture, now the de facto global

Read more

What’s the ‘real deal’ on the Internet of Things?

Posted on: December 16, 2013

The ‘Internet of Things’ buzzword appears to have picked up steam during the past several months as large players such as GE and Cisco have touted their stories on the growing number of connected devices. But, as Alex Brisbourne of KORE asks, how different, if at all, is the Internet of Things when compared with other connected device markets,

Read more

M2M Now Magazine December 2013 Edition

Posted on: December 5, 2013

M2M Now magazine explores the evolving opportunities and challenges facing CSPs across this sector. Our exclusive interviews pass on some key lessons learned by those who have taken the first steps in next gen Machine to Machine (M2M) services. In the latest issue: TALKING HEADS: Alexander Bufalino of Telit tells how one-stop shops and M2M with a ‘wired

Read more