Security Enabled Communication: Avoiding hacking points and achieving end-to-end security in M2M solutions

Telenor Connexion Stephen Bryant
Head of Technology and Operations, Telenor Connexion

As more products become connected they are exposed to potential hacking attacks, fraud or misusage. Hence improving privacy, integrity and security becomes a critical part of a M2M and connected service deployment program.

  • Examine how an end-to-end security approach is fundamental for connected service environments and mobile communications to bring about real business benefits
  • Hear how possible hacking points in an M2M connected service are addressed to avoid security weaknesses in product development
  • Discuss optimised configuration and remote management of M2M devices as well as how to scale up and add new capabilities in the future

LOADING...
Please wait while system loads...
LOADING...
Please wait while system loads...
Site by
Privacy Policy | Terms of Use informa-tech