Security Enabled Communication: Avoiding hacking points and achieving end-to-end security in M2M solutions
Stephen Bryant Head of Technology and Operations, Telenor Connexion
As more products become connected they are exposed to potential hacking attacks, fraud or misusage. Hence improving privacy, integrity and security becomes a critical part of a M2M and connected service deployment program.
Examine how an end-to-end security approach is fundamental for connected service environments and mobile communications to bring about real business benefits
Hear how possible hacking points in an M2M connected service are addressed to avoid security weaknesses in product development
Discuss optimised configuration and remote management of M2M devices as well as how to scale up and add new capabilities in the future