Welcome!

News Feed Item

INSIDE Secure Will Top the Standards in Securing Virtual Private Networks at MWC 2014

INSIDE Secure (NYSE Euronext Paris: INSD), a leader in embedded security solutions for mobile and connected devices, announces it will demonstrate its secure VPN (Virtual Private Network) client at Mobile World Congress, Feb 24 – 27. INSIDE Secure VPN provides the highest level of protection for the most demanding enterprise and government data - the target of the ever-increasing amount of mobile malware.

INSIDE will run three demos that combine a high-security VPN with secure authentication, using well-established security technologies that have been deployed in over 100 million devices.

The first demo is the INSIDE Secure developed mobile software VPN on a Tizen device. INSIDE has made its market leading mobile VPN client available on this new operating system. INSIDE brings the first VPN Client combining FIPS-validated crypto and suite B to the Tizen ecosystem.

The second demo shows how to harden the mobile VPN solution by running Symantec VIP one time password authentication inside a Trustonic Trusted Execution Environment, leveraging the hardware protection provided by ARM TrustZone. One Time Password (OTP) solutions such as Symantec VIP are the most common form of two-factor authentication. This mobile VPN solution protects enterprise and government data from software attacks. INSIDE is the only security technology firm to offer a VPN client with heightened security that is based on ARM TrustZone. For organizations looking to support the rising number of employees connecting remotely, INSIDE leverages Trustonic and Symantec technologies to perform a high-security two-factor authentication suitable for government and corporate needs.

The third demo is a secure VPN protected with a Secure Element. It protects sensitive data from both malware and physical attacks, bringing an additional layer of security. The authentication is run in an applet inside the secure element. By combining INSIDE security expertise in hardware and software, INSIDE can offer the highest security needed to protect critically sensitive enterprise and government data.

“INSIDE is pleased to be demonstrating its wide security offering at Mobile World Congress 2014, the biggest event in the mobile industry,” said Simon Blake Wilson, Executive Vice President of the Mobile Security Business Division at INSIDE Secure. “In the face of increasing malware attacks and other threats, INSIDE is quickly leveraging the latest technologies to secure data from enterprises, governments and end-users. INSIDE provides all the layers of protection at the hardware and software level customers need.”

“Enterprises need no longer compromise between the user convenience of employee owned devices and the protection of business information”, said Olivier Leger, Executive Vice President of Sales and Marketing of Trustonic. "Our ‹t-base TEE makes it easier to secure VPN connections with integrated strong two factor authentication and isolated session key handling.”

"With the majority of businesses now allowing their employees to access corporate networks from mobile devices, it introduces a higher risk of malicious attacks and compromised data,” said Nicolas Popp, Vice President, Identity and Authentication, Symantec Corp. “By using the INSIDE Secure mobile VPN app with Symantec VIP two-factor authentication inside the hardware-backed TEE environment, businesses can offer the convenience and productivity that their employees are requesting without sacrificing security. With the increasing reality of a company experiencing a data breach, businesses can not afford to cut corners on protecting their corporate data."

Mobile malware threats increased by 163 percent in 2012, and 95 percent of all threats were targeted at Android (source: NQ Mobile report, April 2013).

About INSIDE Secure

INSIDE Secure (NYSE Euronext Paris FR0010291245 – INSD) provides comprehensive embedded security solutions. World-leading companies rely on INSIDE Secure’s mobile security and secure transaction offerings to protect critical assets including connected devices, content, services, identity and transactions. Unmatched security expertise combined with a comprehensive range of IP, semiconductors, software and associated services gives INSIDE Secure customers a single source for advanced solutions and superior investment protection. For more information, visit www.insidesecure.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
The vision of a connected smart home is becoming reality with the application of integrated wireless technologies in devices and appliances. The use of standardized and TCP/IP networked wireless technologies in line-powered and battery operated sensors and controls has led to the adoption of radios in the 2.4GHz band, including Wi-Fi, BT/BLE and 802.15.4 applied ZigBee and Thread. This is driving the need for robust wireless coexistence for multiple radios to ensure throughput performance and th...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...