Expert Opinion: The business case for security enabled communication

As more products become connected they are also exposed to potential ‘hacking’ attacks, fraud or misuse. Hence, as Stephen Bryant writes, improving privacy, integrity and security becomes a critical part of an M2M service deployment programme.


One of my favourite quotations is Henry David Thoreau’s, “Men have become the tools of their tools.” As a technologist and firm believer that technology can bring a multitude of benefits for businesses and consumers, I’m also a skeptic as more often than not product and service offerings are shaped around the often awkward mix of technology and suppliers, which comprise the key building blocks of many of our customers’ offerings.

In my view, it is the product or service offering that should shape how the technology is delivered. At Telenor Connexion we pride ourselves on customer service and the ability to help our customers get their offerings to market, and we’re now turning our eyes towards the total business case around security as an area where we can help our customers simplify their connectivity strategy and increase security levels.

The de facto M2M set-up for connectivity involves both a private APN and VPN for security which at present is viewed as a basic and uninteresting M2M hygiene factor. But we believe it is time to look past these as the primary means of securing connectivity, so that we can help customers turn security into a solution which helps them reduce their costs, allows for additional revenue channels and provides them with more flexibility in their overall connectivity strategy. And most importantly raises the level of security from the APN and VPN set-up provided by today’s technology. So how do we achieve these ambitious aspirations?

Protection from data dangers

Security as it is traditionally presented is a ‘must have’ hygiene factor to protect your data from the dangers that are lurking out there. Indeed, there have been a number of security-related incidents involving M2M devices – but from experience I don’t like to make decisions motivated purely by fear. I also want to reduce complexity, see savings where possible and have the security support the business going forward. To these ends we have introduced our embedded Security Enabled Communications (eSEC) service, which enables end-to-end encryption all the way from the M2M device through any connectivity channel to a security gateway. This is effectively ‘over the top’ of any communications technology and sees the need for APNs and VPNs removed.

We believe this is important as most business offering services using M2M have multiple connectivity providers and may also rely on tether devices such as smartphones. The operational overhead and costs for these various security methods is then reduced by using a single end-to-end encryption solution. And by reducing the complexity of a number of security setups the overall security level is increased.

Stephen Bryant, CTO of Telenor Connexion
Stephen Bryant has worked with Telenor Connexion since 2010. He is responsible for Telenor Connexion’s technology and operations including customer service. Stephen worked for over 10 years across the Occident delivering large scale IT and Telecoms solutions in many verticals whilst working for systems integrators such as Logica, Fujitsu Services and BearingPoint – solutions including Telenor Connexion’s M2M platform.

Secure Walled Garden

Having an end-to-end security solution also means a Walled Garden where content, applications, payments and other services can securely be made available to open new revenue possibilities.

To accomplish this there are four key criteria – banking grade security, lightweight encryption methods, open roadmap and manageability. All are addressed in the eSEC service. We use accepted and internationally recognised encryption suites and methods, which only add a few bytes of overhead to every packet. We provide a managed service and support products which have a supported and maintained roadmap.

Moreover, the eSEC services are not limited to use with Telenor Connexion’s SIM or connectivity, meaning all IP and SMS connectivity can be secured regardless of supplier of connectivity channel. As important as the technology, we provide a full managed security service providing alarms, reporting and 24/7 surveillance and service desk that is ready to act!

This holistic approach of achieving end-to-end security in M2M solutions helps customers reduce complexity, increase security and simplify M2M.


Aeris Intelligent IoT network provides System Loco with reliable connectivity for worldwide track and trace of sustainable IoT-enabled smart pallets

Posted on: July 5, 2022

Aeris, the global Internet of Things (IoT) solutions provider, announced that System Loco, a global provider of supply chain and asset tracking solutions, has selected the Aeris Intelligent IoT Network to provide next generation connectivity to support and manage the worldwide track and trace of smart pallets employed by System Loco’s customers throughout the world.

Read more

Removing IT bottlenecks: The key’s simplicit

Posted on: July 5, 2022

A report by Mulesoft found that the IT teams of just 37% of organisations completed all of their assigned projects last year. Digitalisation can gather valuable data insights and optimise processes, but progress is often held back by the large IT workload such projects create. Here, Johan Jonzon, CMO and co-founder in edge analytics for

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.

Read more

What is IoT?

Posted on: July 7, 2019

What is IoT Data as a new oil IoT connectivity What is IoT video So what’s IoT? The phrase ‘Internet of Things’ (IoT) is officially everywhere. It constantly shows up in my Google news feed, the weekend tech supplements are waxing lyrical about it and the volume of marketing emails I receive advertising ‘smart, connected

Read more
IoT Newsletter

Join the IoT Now online community for FREE, to receive: Exclusive offers for entry to all the IoT events that matter, round the world

Free access to a huge selection of the latest IoT analyst reports and industry whitepapers

The latest IoT news, as it breaks, to your inbox