Over the last ten years, major changes have occurred in IT. With the Internet driving the pace, one of the most significant developments has been the rise of IP to become the dominant protocol. Another key element has been the decentralisation of systems, with the perimeters of organisations rapidly disappearing. Anywhere, anytime, anyhow access is now becoming increasingly achievable. This ‘deperimeterisation’ of the network has significantly changed the security landscape. Organisations now need to move from a reliance on powerful gateway security to a recognition that applications, departments and network segments need their own security. While this challenge has been recognised and addressed by many businesses, one key area has been largely overlooked – that of machine-to-machine connections (M2M).