Expert Opinion: The business case for security enabled communication

As more products become connected they are also exposed to potential ‘hacking’ attacks, fraud or misuse. Hence, as Stephen Bryant writes, improving privacy, integrity and security becomes a critical part of an M2M service deployment programme.

 

One of my favourite quotations is Henry David Thoreau’s, “Men have become the tools of their tools.” As a technologist and firm believer that technology can bring a multitude of benefits for businesses and consumers, I’m also a skeptic as more often than not product and service offerings are shaped around the often awkward mix of technology and suppliers, which comprise the key building blocks of many of our customers’ offerings.

In my view, it is the product or service offering that should shape how the technology is delivered. At Telenor Connexion we pride ourselves on customer service and the ability to help our customers get their offerings to market, and we’re now turning our eyes towards the total business case around security as an area where we can help our customers simplify their connectivity strategy and increase security levels.

The de facto M2M set-up for connectivity involves both a private APN and VPN for security which at present is viewed as a basic and uninteresting M2M hygiene factor. But we believe it is time to look past these as the primary means of securing connectivity, so that we can help customers turn security into a solution which helps them reduce their costs, allows for additional revenue channels and provides them with more flexibility in their overall connectivity strategy. And most importantly raises the level of security from the APN and VPN set-up provided by today’s technology. So how do we achieve these ambitious aspirations?

Protection from data dangers

Security as it is traditionally presented is a ‘must have’ hygiene factor to protect your data from the dangers that are lurking out there. Indeed, there have been a number of security-related incidents involving M2M devices – but from experience I don’t like to make decisions motivated purely by fear. I also want to reduce complexity, see savings where possible and have the security support the business going forward. To these ends we have introduced our embedded Security Enabled Communications (eSEC) service, which enables end-to-end encryption all the way from the M2M device through any connectivity channel to a security gateway. This is effectively ‘over the top’ of any communications technology and sees the need for APNs and VPNs removed.

We believe this is important as most business offering services using M2M have multiple connectivity providers and may also rely on tether devices such as smartphones. The operational overhead and costs for these various security methods is then reduced by using a single end-to-end encryption solution. And by reducing the complexity of a number of security setups the overall security level is increased.

Stephen Bryant, CTO of Telenor Connexion
Stephen Bryant has worked with Telenor Connexion since 2010. He is responsible for Telenor Connexion’s technology and operations including customer service. Stephen worked for over 10 years across the Occident delivering large scale IT and Telecoms solutions in many verticals whilst working for systems integrators such as Logica, Fujitsu Services and BearingPoint – solutions including Telenor Connexion’s M2M platform.

Secure Walled Garden

Having an end-to-end security solution also means a Walled Garden where content, applications, payments and other services can securely be made available to open new revenue possibilities.

To accomplish this there are four key criteria – banking grade security, lightweight encryption methods, open roadmap and manageability. All are addressed in the eSEC service. We use accepted and internationally recognised encryption suites and methods, which only add a few bytes of overhead to every packet. We provide a managed service and support products which have a supported and maintained roadmap.

Moreover, the eSEC services are not limited to use with Telenor Connexion’s SIM or connectivity, meaning all IP and SMS connectivity can be secured regardless of supplier of connectivity channel. As important as the technology, we provide a full managed security service providing alarms, reporting and 24/7 surveillance and service desk that is ready to act!

This holistic approach of achieving end-to-end security in M2M solutions helps customers reduce complexity, increase security and simplify M2M.

RECENT ARTICLES

The impact of IoT on medical equipment and healthcare

Posted on: April 24, 2024

In the healthcare industry, medical equipment and medical IoT have become an important part of treatment. More and more connected devices are not only changing patient care but also improving medical intelligence. With the help of technical innovation, medical devices are not only reducing operational costs but also providing a promising path for improving health

Read more

Invicti launches AI-powered predictive risk scoring for web applications

Posted on: April 24, 2024

Invicti has announced its new AI-enabled Predictive Risk Scoring capability. The feature assigns predicted risk to applications and helps organisations gain a view of their overall application security risk.

Read more
FEATURED IoT STORIES

What is IoT? A Beginner’s Guide

Posted on: April 5, 2023

What is IoT? IoT, or the Internet of Things, refers to the connection of everyday objects, or “things,” to the internet, allowing them to collect, transmit, and share data. This interconnected network of devices transforms previously “dumb” objects, such as toasters or security cameras, into smart devices that can interact with each other and their

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption, is leading the charge to dominate the next decade’s discussion around business IT. Below, we’ll discuss the current boom, what’s driving it, where it’s going,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.

Read more