Search
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

De la Théorie à la pratique











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Adoption of Trustonic Security Platforms passes 1 billion device milestone

February 2017 by Marc Jacob

Device and application security specialist, Trustonic has announced that, in the four-year period since the company launched, its Trusted Execution Environment (TEE) hardware security technology has now been embedded into more than one billion devices globally. This includes smartphones from most of the leading Android device makers worldwide, as well as wearables and other industrial and consumer internet of things (IoT) devices. This news reaffirms that the Trustonic TEE is the most widely-deployed TEE technology globally.

Trustonic TEE technology delivers security services to devices and applications, ensuring sensitive data is stored, processed and protected in an isolated, trusted environment within the main processor of a smartphone or any connected device. This offers security against software attacks by enforcing protection, confidentiality, integrity and data access rights. The Root of Trust also ensures that a trusted identity is preserved within the device, preventing fraudulent use or copying. Compared with other security environments on the device, the TEE also offers high processing speeds and a large amount of accessible memory.

Trustonic’s TEE is the only open TEE available. Uniquely, it permits third-party applications to be provisioned after the handset or device has been deployed, which opens up vast commercial opportunities for both device manufacturers and digital service providers. The latter will have the potential to dynamically add value to the end user by offering new secure services and functionality, once the device is already in their hands.

Attending Mobile World Congress? Trustonic will be demonstrating its latest technology in hall 6, stand 6I40. Come and meet the team to discuss connected device and advanced application security, hardware Root of Trust, how TEE meets Google’s mandate for hardware-based security and the use of TEE technology to both protect mobile financial services, IoT, social media, premium content and enterprise and governmental implementations and provide advanced capabilities into the future.




See previous articles

    

See next articles