@ThingsExpo Authors: Elizabeth White, Zakia Bouachraoui, Liz McMillan, Pat Romanski, Yeshim Deniz

News Feed Item

As M2M Use Skyrockets to Support Internet of Things, Global Study Finds Security Not Keeping Pace

IT Admins Disagree on Level of Security, Priorities and Responsibility for Remediation

HELSINKI and WALTHAM, Mass., Feb. 24, 2014 /PRNewswire/ -- Every day, countless invisible machine-to-machine (M2M) transactions and processes power automation of critical business and operational processes across industries. However, even as automated processes become the dominant mode of computing – outstripping the traditional model of interactive human-to-computer transactions – M2M security is often overlooked or misunderstood.

These findings are the results of a commissioned study conducted by Forrester Consulting on behalf of SSH Communications Security, known the world over as the inventor of the ubiquitous secure shell and SFTP protocols. The study surveyed 151 US enterprise IT decision-makers responsible for IT security in financial services, the federal government, retail, manufacturing, utilities/energy/waste management, business services, and high-tech (hosting and cloud services providers) industries.

The study found that the rise of machine-to-machine (M2M) connections within data centers across industries has far outstripped the awareness of organizations about how best to secure them, resulting in a misalignment of security and compliance priorities that is placing organizations at risk.


Organizations expect to increase their volume of M2M transactions.

  • M2M processes are used by virtually all organizations, and sixty-two percent of organizations expect to increase their use of M2M processes over the next 12 months.
  • More than half of the financial institutions surveyed currently use M2M connections for billing.
  • Fifty percent of respondents currently use M2M for logistics management and customer service.

M2M security is not seen as a high priority despite its role in data security

  • Despite wide usage of M2M transactions and processes to power critical business functions, organizations are not paying adequate attention to M2M security.
  • Few organizations appear to make the connection of robust M2M security as an important component of data security strategy – a top priority for many firms. 
  • Sixty-eight percent of respondents said data security was a critical priority, while only 25 percent said the same about M2M security.

Secure Shell Used Widely to Secure M2M Processes, but Management is Lacking

  • Organizations depend on Secure Shell for a number of uses, but are challenged to adequately manage Secure Shell keys in the network, leaving keys open to theft.
  • Financial institutions and hosting/cloud providers are the most likely to use Secure Shell to secure M2M communications.
  • Financial institutions are the least likely to say they have no Secure Shell access control issues (29 percent) while government institutions are most likely to say that their Secure Shell situation is fine (65 percent).
  • Tellingly, 65 percent of respondents said they centralize Secure Shell key management, while an equal 65 percent admitted that responsibility for Secure Shell management is shared among individuals.


Tatu Ylonen, CEO of SSH Communications Security and inventor of the SSH protocol, said: "As organizations across all sectors embrace the concept of the Internet of Things, enabling more objects and sensors to communicate to support new business models, the need to secure automated M2M connections is increasingly critical. However, misunderstandings regarding how best to secure M2M transactions – and whose responsibility it is to do so – have placed organizations under significant risk of data breach. We commissioned this study to discover how financial institutions, enterprises and government agencies perceive their M2M security needs. We discovered that they must take bold steps to evaluate the scope and strength of their M2M security strategies if they are to prevent data theft and comply with industry standards."

"The Rise of IT Automation and the New Security Imperatives: Growth in M2M Processes Requires a Fresh Approach to Security," published Feb. 14, 2014 by Forrester Consulting.

About SSH Communications Security
Founded in 1995, SSH Communications Security is the company that invented the SSH protocol - the gold standard protocol for data-in-transit security solutions. Today, over 3,000 customers across the globe - including seven of the Fortune 10 - trust our Security and Access Management Platform to secure the path to their information assets. We enable and enhance business for thousands of customers in multiple industries in the private and public sectors around the world. A fast-growing company, SSH Communications Security operates in the Americas, Europe, and APAC regions, with headquarters located in Helsinki, Finland. The company shares (SSH1V) are quoted on the NASDAQ OMX Helsinki. 

For more information on SSH Communications Security please visit http://www.ssh.com

Corporate Contact:

Media Contact:

Jason Thompson

Peggy Tierney Galvin

SSH Communications Security

Nadel Phelan, Inc.



[email protected]

[email protected]

SOURCE SSH Communications Security

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected pat...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the mod...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Druva is the global leader in Cloud Data Protection and Management, delivering the industry's first data management-as-a-service solution that aggregates data from endpoints, servers and cloud applications and leverages the public cloud to offer a single pane of glass to enable data protection, governance and intelligence-dramatically increasing the availability and visibility of business critical information, while reducing the risk, cost and complexity of managing and protecting it. Druva's...
BMC has unmatched experience in IT management, supporting 92 of the Forbes Global 100, and earning recognition as an ITSM Gartner Magic Quadrant Leader for five years running. Our solutions offer speed, agility, and efficiency to tackle business challenges in the areas of service management, automation, operations, and the mainframe.
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, @CloudEXPO and DXWorldEXPO are two of the most important technology events of the year. Since its launch over eight years ago, @CloudEXPO and DXWorldEXPO have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, we provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading...
DSR is a supplier of project management, consultancy services and IT solutions that increase effectiveness of a company's operations in the production sector. The company combines in-depth knowledge of international companies with expert knowledge utilising IT tools that support manufacturing and distribution processes. DSR ensures optimization and integration of internal processes which is necessary for companies to grow rapidly. The rapid growth is possible thanks, to specialized services an...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...