Welcome!

News Feed Item

INSIDE Secure Will Top the Standards in Securing Virtual Private Networks at MWC 2014

INSIDE Secure (NYSE Euronext Paris: INSD), a leader in embedded security solutions for mobile and connected devices, announces it will demonstrate its secure VPN (Virtual Private Network) client at Mobile World Congress, Feb 24 – 27. INSIDE Secure VPN provides the highest level of protection for the most demanding enterprise and government data - the target of the ever-increasing amount of mobile malware.

INSIDE will run three demos that combine a high-security VPN with secure authentication, using well-established security technologies that have been deployed in over 100 million devices.

The first demo is the INSIDE Secure developed mobile software VPN on a Tizen device. INSIDE has made its market leading mobile VPN client available on this new operating system. INSIDE brings the first VPN Client combining FIPS-validated crypto and suite B to the Tizen ecosystem.

The second demo shows how to harden the mobile VPN solution by running Symantec VIP one time password authentication inside a Trustonic Trusted Execution Environment, leveraging the hardware protection provided by ARM TrustZone. One Time Password (OTP) solutions such as Symantec VIP are the most common form of two-factor authentication. This mobile VPN solution protects enterprise and government data from software attacks. INSIDE is the only security technology firm to offer a VPN client with heightened security that is based on ARM TrustZone. For organizations looking to support the rising number of employees connecting remotely, INSIDE leverages Trustonic and Symantec technologies to perform a high-security two-factor authentication suitable for government and corporate needs.

The third demo is a secure VPN protected with a Secure Element. It protects sensitive data from both malware and physical attacks, bringing an additional layer of security. The authentication is run in an applet inside the secure element. By combining INSIDE security expertise in hardware and software, INSIDE can offer the highest security needed to protect critically sensitive enterprise and government data.

“INSIDE is pleased to be demonstrating its wide security offering at Mobile World Congress 2014, the biggest event in the mobile industry,” said Simon Blake Wilson, Executive Vice President of the Mobile Security Business Division at INSIDE Secure. “In the face of increasing malware attacks and other threats, INSIDE is quickly leveraging the latest technologies to secure data from enterprises, governments and end-users. INSIDE provides all the layers of protection at the hardware and software level customers need.”

“Enterprises need no longer compromise between the user convenience of employee owned devices and the protection of business information”, said Olivier Leger, Executive Vice President of Sales and Marketing of Trustonic. "Our ‹t-base TEE makes it easier to secure VPN connections with integrated strong two factor authentication and isolated session key handling.”

"With the majority of businesses now allowing their employees to access corporate networks from mobile devices, it introduces a higher risk of malicious attacks and compromised data,” said Nicolas Popp, Vice President, Identity and Authentication, Symantec Corp. “By using the INSIDE Secure mobile VPN app with Symantec VIP two-factor authentication inside the hardware-backed TEE environment, businesses can offer the convenience and productivity that their employees are requesting without sacrificing security. With the increasing reality of a company experiencing a data breach, businesses can not afford to cut corners on protecting their corporate data."

Mobile malware threats increased by 163 percent in 2012, and 95 percent of all threats were targeted at Android (source: NQ Mobile report, April 2013).

About INSIDE Secure

INSIDE Secure (NYSE Euronext Paris FR0010291245 – INSD) provides comprehensive embedded security solutions. World-leading companies rely on INSIDE Secure’s mobile security and secure transaction offerings to protect critical assets including connected devices, content, services, identity and transactions. Unmatched security expertise combined with a comprehensive range of IP, semiconductors, software and associated services gives INSIDE Secure customers a single source for advanced solutions and superior investment protection. For more information, visit www.insidesecure.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Big Data, cloud, analytics, contextual information, wearable tech, sensors, mobility, and WebRTC: together, these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at @ThingsExpo, Erik Perotti, Senior Manager of New Ventures on Plantronics’ Innovation team, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it m...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
In their general session at 16th Cloud Expo, Michael Piccininni, Global Account Manager - Cloud SP at EMC Corporation, and Mike Dietze, Regional Director at Windstream Hosted Solutions, reviewed next generation cloud services, including the Windstream-EMC Tier Storage solutions, and discussed how to increase efficiencies, improve service delivery and enhance corporate cloud solution development. Michael Piccininni is Global Account Manager – Cloud SP at EMC Corporation. He has been engaged in t...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus o...
Big Data engines are powering a lot of service businesses right now. Data is collected from users from wearable technologies, web behaviors, purchase behavior as well as several arbitrary data points we’d never think of. The demand for faster and bigger engines to crunch and serve up the data to services is growing exponentially. You see a LOT of correlation between “Cloud” and “Big Data” but on Big Data and “Hybrid,” where hybrid hosting is the sanest approach to the Big Data Infrastructure pro...
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Hardware virtualization and cloud computing allowed us to increase resource utilization and increase our flexibility to respond to business demand. Docker Containers are the next quantum leap - Are they?! Databases always represented an additional set of challenges unique to running workloads requiring a maximum of I/O, network, CPU resources combined with data locality.
In his General Session at DevOps Summit, Asaf Yigal, Co-Founder & VP of Product at Logz.io, will explore the value of Kibana 4 for log analysis and will give a real live, hands-on tutorial on how to set up Kibana 4 and get the most out of Apache log files. He will examine three use cases: IT operations, business intelligence, and security and compliance. This is a hands-on session that will require participants to bring their own laptops, and we will provide the rest.
"We're bringing out a new application monitoring system to the DevOps space. It manages large enterprise applications that are distributed throughout a node in many enterprises and we manage them as one collective," explained Kevin Barnes, President of eCube Systems, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
In his General Session at 16th Cloud Expo, David Shacochis, host of The Hybrid IT Files podcast and Vice President at CenturyLink, investigated three key trends of the “gigabit economy" though the story of a Fortune 500 communications company in transformation. Narrating how multi-modal hybrid IT, service automation, and agile delivery all intersect, he will cover the role of storytelling and empathy in achieving strategic alignment between the enterprise and its information technology.
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud enviro...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
@DevOpsSummit at Cloud taking place June 6-8, 2017, at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developm...
"LinearHub provides smart video conferencing, which is the Roundee service, and we archive all the video conferences and we also provide the transcript," stated Sunghyuk Kim, CEO of LinearHub, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.