Welcome!

News Feed Item

INSIDE Secure Launches a Unique and Comprehensive Mobile Security Offer

INSIDE Secure (NYSE Euronext Paris: INSD), a leader in embedded security solutions for mobile and connected devices, today announced the availability of second-generation VaultSEcure™ secure element, the market’s first fully comprehensive mobile security chip. The key feature that sets it apart from other secure elements available today is its built-in applications to address security vulnerabilities in enterprise and entertainment markets, such as DAR (Data-at-Rest) protection, VPN (Virtual Private Network), DRM (Digital Rights Management) and others, a feature unmatched elsewhere in the market.

INSIDE Secure is the only company on the market capable of providing a comprehensive system solution for mobile security. The VaultSEcure device gives mobile platform providers critical security in a single package. It contains hardware, operating system and built-in applications, eliminating the need for OEMs and reference platform providers to engage with multiple providers. Equally important, the compatibility issues OEMs and reference platform providers face as they struggle to secure even one application in a mobile device are also eliminated. The INSIDE VaultSEcure solution provides cost and time-to-market benefits by offering OEMs a one-stop shop for their security needs. Not the least, VaultSEcure still offers functionalities expected from the conventional secure element such as NFC Payment, Transit, Access control etc.

With this offering, INSIDE is targeting Tier-1 makers of smartphones and tablets and reference platform providers. Mobile devices have evolved into open software platforms that are capable of downloading a huge variety of applications, including high-value services. However, not all functionality can be tested by the OEMs and increasingly malicious code is being created to target this class of devices. For example, more and more enterprises are encouraging their employees to bring their personal devices to the workplace (BYOD). Over the past few months, there has been a surge in malware attacks, resulting in consumers and enterprises demanding higher levels of security.

In addition, the VaultSEcure product is well-positioned to address the security needed to support the fast growth in connected devices. By 2017, 87% of the worldwide smart connected device market will be tablets and smartphones, with more than 2 billion units shipped, with PCs (both desktop and laptop) being 13% of the market (IDC - December 2013).

“INSIDE Secure has a broad perspective on mobile security through its unique combination of hardware and software products,” said Simon Blake Wilson, Executive Vice President of the Mobile Security Division at INSIDE Secure. “Mobile security is a burning issue today. We are excited to bring the security benefits of the Secure Element to applications like enterprise and entertainment that have previously been limited to software security.”

About VaultSEcure

Based on ARM’s fast-performing SecureCoreTM technology, the VaultSEcure solution embeds INSIDE’s pioneering JavaCard and Global Platform compliant operating system. VaultSEcure also has increased memory (1 megabyte) to handle the additional personal and sensitive data and keys needed to protect the many more apps users are demanding to use. VaultSEcure brings tamper resistant security to mobile devices to hold secure data and keys, and protects from side channel attacks, which are the key requirements of payment, ID and entertainment markets. The TEE, Trusted Execution Environment (as defined and standardized by Global Platform) is a secure area that resides in the main processor of a smart phone and ensures that sensitive data is processed in a trusted environment. Thus, VaultSEcure working with the TEE presents the ultimate security solutions on the mobile devices.

INSIDE Secure at Mobile World Congress

To learn more about the VaultSEcure product and other INSIDE Secure offerings during Mobile World Congress, Feb 24 – 27 visit the Hospitality Suite, Carrer de la Botanica, 33, 2nd floor. There, INSIDE will demonstrate its Secure VPN (Virtual Private Network) client, which provides the highest level of protection for the most demanding enterprise and government data, the target of the ever-increasing amount of mobile malware.

About INSIDE Secure

INSIDE Secure (NYSE Euronext Paris FR0010291245 – INSD) provides comprehensive embedded security solutions. World-leading companies rely on INSIDE Secure’s mobile security and secure transaction offerings to protect critical assets including connected devices, content, services, identity and transactions. Unmatched security expertise combined with a comprehensive range of IP, semiconductors, software and associated services gives INSIDE Secure customers a single source for advanced solutions and superior investment protection. For more information, visit www.insidesecure.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The speed of software changes in growing and large scale rapid-paced DevOps environments presents a challenge for continuous testing. Many organizations struggle to get this right. Practices that work for small scale continuous testing may not be sufficient as the requirements grow. In his session at DevOps Summit, Marc Hornbeek, Sr. Solutions Architect of DevOps continuous test solutions at Spirent Communications, explained the best practices of continuous testing at high scale, which is rele...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Hardware virtualization and cloud computing allowed us to increase resource utilization and increase our flexibility to respond to business demand. Docker Containers are the next quantum leap - Are they?! Databases always represented an additional set of challenges unique to running workloads requiring a maximum of I/O, network, CPU resources combined with data locality.
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"A lot of times people will come to us and have a very diverse set of requirements or very customized need and we'll help them to implement it in a fashion that you can't just buy off of the shelf," explained Nick Rose, CTO of Enzu, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and micro services. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your contain...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
Information technology (IT) advances are transforming the way we innovate in business, thereby disrupting the old guard and their predictable status-quo. It’s creating global market turbulence. Industries are converging, and new opportunities and threats are emerging, like never before. So, how are savvy chief information officers (CIOs) leading this transition? Back in 2015, the IBM Institute for Business Value conducted a market study that included the findings from over 1,800 CIO interviews ...
"Operations is sort of the maturation of cloud utilization and the move to the cloud," explained Steve Anderson, Product Manager for BMC’s Cloud Lifecycle Management, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackIQ...
"I think that everyone recognizes that for IoT to really realize its full potential and value that it is about creating ecosystems and marketplaces and that no single vendor is able to support what is required," explained Esmeralda Swartz, VP, Marketing Enterprise and Cloud at Ericsson, in this SYS-CON.tv interview at @ThingsExpo, held June 7-9, 2016, at the Javits Center in New York City, NY.
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...