Security Requirements For New M2M Business Models

Security Requirements For New M2M Business Models

 

Available On Demand
Duration 60min
Speakers
Patrick Donegan
Senior Analyst
Heavy Reading
Patrick Donegan
Patrick Donegan has more than 20 years' experience as a telecom market journalist, analyst, and strategist. He joined Heavy Reading in 2006 and began building Heavy Reading’s research and consulting practice in mobile network security in 2009. In addition to a number of custom research and consulting assignments for business and government clients in this space he has also published the following Heavy Reading research: Next-Generation Mobile Security Gateways for 3G & 4G Networks (March 2012); Multi-Client studies on Mobile Network Security (September 2011 2012 and 2013) and Next-Gen Security Strategies for Mobile Network Infrastructure (November 2010). Patrick hosted Light Reading’s first ever Mobile Network Security conference in New York in November 2012 and will be hosting an exclusive Heavy Reading breakfast on the same subject at Mobile World Congress in 2014.
Vaughn Eisler
Business Development Manager
Symantec
Vaughn Eisler
Vaughn has been at Symantec for 3 years, with responsibility for working with Communications Service Providers to position and sell value added security services to their consumer, commercial and enterprise markets. Prior to that Vaughn worked in the Business Solutions Organization at Nokia Siemens Networks selling network infrastructure and consulting and systems integration sales. Overall, Vaughn has over 15 years of experience in business development, technical sales and product management roles within the CSP vendor community.

When it comes to security most M2M networks that leverage service provider networks rely heavily on 3GPP security for authentication and encryption. But the M2M business model is now evolving from a closed or walled garden model into one which is a lot more open. The model is more open to real-time control based applications rather than mere reporting. It’s more open to third party applications. It’s more open to devices dynamically discovering other 3rd party devices. It’s also more open to sharing of data with partners.  And as the business model becomes more open, so new security requirements arise as do new vulnerabilities to security threats. This webinar will discuss the journey that services providers are looking to take with the M2M business model and the new security solutions they need to put in place to support them.

Already a member? Login