Title: Optimising Security with M2M
1Optimising Security with M2M Services
Applications
Nigel Chadwick Director, Mobile Data
Association CEO, Stream Communications
2Mobile Data Association Represents Mobile Data
Centric Businesses AIM Mass Adoption of Wireless
Data Technologies
Stream Communications MVNO Specialist Mobile
Network Services
3Supply Trends Overview
- High Capacity Bandwidths (Network Capacity)
- M2M (orientation) Tariffs
- Evolvement in Device Sophistication, Capability
- Increased Security Resilience Requirements
- SIM Estate Management Efficiently and
Effectively
4Security Perspectives in M2M
- A Security Orientated Devices
- CCTV
- Lone Worker/Personal Safety
- Remote Sensing Monitoring
- Access Control
- Vehicle Tracking/Tracing
- B Devices with Security Implications
- Lift Controls Monitoring
- Digital Signage
- Mobile Payment Systems
5What does Security Mean?
- Reliability
- Authentication
- Encryption
- Monitoring
- Longevity
6Consider...
- Smart Metering Information
- Remote/Digital Signage
- Device Not Communicating
- Cyber-Communication
7Security Features of GSM/GPRS/3G
- Licensed Spectrum
- SIM has Unique Identity
- Over-The-Air Encryption Authentication
8Public APN (unsecure)
Private APN (secure)
9From Operator to You... Is Up To You!
- Your Business Relies Upon Solution Operating!
- Usage Reports (Low High)
- Audit Logs
- Reliable Resilient
- Recovery Planning
10Suppliers Matter!
- Supplier Systems/SLAs Underpin Your Solution
- Single Point of Failure Achilles Heel
- Disaster Recovery Plans, Policy, Infrastructure
- Support Channel Effectiveness
- Service Level Agreements
IS IT FIT FOR PURPOSE?
11M2M Mobile Network Solutions Lifecycle
- 24/7 SIM Management
- 24/7 Services Management
- Resilience Connectivity
- Provisioning Systems
- Network Monitoring
- SIM Monitoring
- Billing Solutions
- Expert Solutions
- Diagnostics
- Bespoke Integration
- Modular Services
Development/Testing Market Launch
Commercialisation
12Other Considerations Longevity
- Lifespan of Solution
- Tariff Stability
- Operator Supplier Stability
- Bearer Support for 2G/3G Modules
13Final Thoughts!
- Avoid Underestimating Supplier Value
- Take Nothing For Granted
- Ask The Obvious Questions
- Optimise Security
- Security Costs Money!