M2M follows a layered, defense-in-depth network security
model using U.S. National Security Agency guidelines, knowledgeable, experienced
IT professionals, and industry networking best practices to secure M2M
solutions.
- Availability: System up time is maintained
at the highest levels through physical security, redundancy, network
protection (firewall, IDS, etc.), hardened OS, and ongoing security
audits.
- Integrity: M2M ensures data is not modified
or corrupted through use of encrypted data signatures, authentication,
reliable storage (RAID5), reliable network (redundancy), CRC, and physical
and logical restricted access.
- Confidentiality M2M ensures restricted
access to data through use of encryption (SSL - RSA 1024/3DES/MD5,
VPN - LPTP, or IPsec), login/password, PKI & biometrics (optional).
|
Other Resources
|