Analyst Report: The rise of M2M security challenges


There will be over 700 million cellular-enabled machine-to-machine (M2M) device adoption and system deployments in the U.S. by 2017. As the volume of M2M devices and associated data increases, so too will the probability of hackers and malware writers targeting these systems to exploit networks, steal data, hijack systems, and compromise workflows.

Security specialists recognize the potential risks and are already developing technologies and methodologies for hardening M2M systems from attack. In the interim, M2M operators and adopters need to understand the security policies, processes, and technologies they can implement today to make their M2M systems less susceptible to hacks, infections, and compromises.

Table of Contents

  1. Summary
  2. Introduction
  3. Defining the M2M world
  4. M2M attack vectors
  5. Safeguarding M2M systems
  6. Final analysis
  7. Further reading
  8. About Lawrence M. Walsh
  9. About GigaOM Pro

Join GigaOm Research! Become a subscriber and get reports like these, plus full access to our collection of over 1,700 reports from world-class analysts.