M2M (machine-to-machine) technology is making gains every day, and to sustain this growth, many in the industry are thinking proactively about how to protect our data, our devices, and our systems. In fact, it’s safe to say privacy and security are never far from our minds in a connected world.
Just this week, a news story broke about how several iterations of connected videoconferencing equipment can be pretty easily hacked, potentially opening up private meetings to the eyes and ears of the world. This kind of revelation makes consumers’ skin crawl.
Even our nation’s lawmakers recognize the public’s squeamishness regarding personal data and how it’s being used. Earlier this week, the U.S. Supreme Court ruled against the use of GPS devices to track citizens without first obtaining a search warrant.
On The Peggy Smedley Show, www.peggysmedleyshow.com, an Internet radio show that covers M2M and connected devices, Tom Thomassen, senior manager of development, Office of the CTO, Symantec, www.symantec.com, talked to host Peggy Smedley about the importance of addressing the challenges of securing end-to-end networks in both consumer and enterprise applications. In essence, he says, security is crucial to inspiring confidence in a connected world.
Through its security, storage, and systems-management solutions, Symantec hopes to help its customers keep a handle on their increasing number of end points in such a data-driven world. The company’s STAR (Security Technology and Response) division—made up of security engineers, virus hunters, threat analysts, and researchers—keep a vigilant eye on what Symantec calls the “Internet security threat landscape.”
Meanwhile, Wind River, www.windriver.com, a wholly owned subsidiary of Intel Corp., www.intel.com, has partnered with Coverity, www.coverity.com, which offers a suite of products for development testing, to build security into the M2M development process.
By integrating Coverity’s development testing platform for security with Wind River’s embedded software, the companies hope to provide a solution that can address security vulnerabilities very early on in the process as software applications are being developed.
Making security a priority at an early development stage can reduce the risk of a data-security breach later on in a solution’s lifecycle. Because more and more devices now have embedded connectivity—from healthcare products to in-vehicle systems—the issue of data security is more important than ever.
“Increased security threats and continued growth of embedded device connectivity create an urgent need to address security during development,” says Wind River’s Marc Brown. Part of the solution, as Brown suggests, may be to identify and tackle potential security flaws before they become an issue.