Thursday, 28 February 2013

M2M Security Framework

The components to be considered for security framework are

  •  People and Processes
  •  Devices
  •  Network and Applications

Top Priority of M2M Configurations

Data Security is the top priority in M2M Configurations.

 The chances of security breaches increase in direct proportion to the 'degree of connectivity' and as more endpoints become connected to the enterprise IT back end systems through public IP networks, the chances of things going wrong, either intentionally or un-intentionally, are inherently accelerated.

Wednesday, 27 February 2013

What is M2M


Machine-to-Machine (M2M) means no human intervention whilst devices are communicating end-to-end.



In the last two decades, the various advancements in the wireless industry allowed people all over the world to connect. In the next decade, we will see a revolution where a diverse range of devices across different sectors will be able to communicate with each other to provide services.  The technology behind this is the Machine to Machine Communications. (M2M). This technology enables devices to interact with each other over a wired or wireless communication network without human intervention.