Welcome!

News Feed Item

INSIDE Secure Leads the Market for Mobile Applications Protection with Industry First Software Secure Element

INSIDE Secure, a leader in embedded security solutions for mobile and connected devices, today announced at Cartes America the launch of MatrixSSE, a software secure element for mobile applications including enterprise, entertainment and financial applications. The solution allows mobile applications to securely process and store sensitive data in a hostile mobile environment. It simplifies the integration of security into mobile applications and allows them to defend against malicious attacks.

According to the latest McAfee report, Android malware almost tripled between 2012 and 2013(1). Today, attackers can easily gain access to mobile devices and simply steal keys and other secrets from software that uses traditional cryptographic implementations. MatrixSSE solves this problem by securing the execution and storage environment using whitebox cryptography and code obfuscation technology. In particular, tamper resistant MatrixSSE also prevents out-of-context execution and other “lifting attacks” that plague other less comprehensive solutions by using its advanced context enforcement feature.

MatrixSSE combines a number of existing technologies, including software and tools from Metaforic, a company acquired by INSIDE Secure on April 5, 2014, and existing INSIDE Secure tools, into a comprehensive package of tested and proven security technology layers that have been deployed in more than 100 million mobile applications in the payment, entertainment and gaming sector. These applications have successfully gone through extensive penetration and attack testing by external security labs.

INSIDE Secure calls MatrixSSE a “software secure element” because it protects applications from a broad range of security threats, similar to traditional hardware secure elements. Whilst hardware secure elements protect applications by isolating them on dedicated hardware, MatrixSSE protects data and processing by isolating them securely within the application. The solution provides the best possible protection in software, with the advantages that it is downloadable and updateable. These are key requirements in the fast moving mobile apps market.

“Hackers, malware and other security issues pose a significant threat to the mobile app ecosystem,” said Simon Blake-Wilson, executive vice-president of Mobile Security division at INSIDE Secure. “We are excited to bring together a broad range of best-of-breed security technologies and put ourselves at the forefront of applications protection.”

Examples of security features within MatrixSSE include:

  • Anti-tamper: prevention of changes to applications
  • Obfuscation: hiding the function of all or part of an application
  • Whitebox cryptography: enabling secure encryption and data storage on any platform
  • Jailbreak detection: allowing an app to determine if it is running on a rooted device
  • Application to application authentication: checking interactions with other applications and hardware are genuine

These features make MatrixSSE well suited to protect a wide range of apps, including payments using Host Card Emulation, entertainment, enterprise and financial applications. Indeed INSIDE Secure is incorporating MatrixSSE into its own market-specific offerings: QuickSec VPN Client for enterprise.

INSIDE Secure is uniquely positioned as the only company able to provide security solutions for enterprise, digital entertainment and financial services markets, the three key market drivers for mobile security. Benefitting from these core expertise, MatrixSSE is built as a trusted foundation for mobile applications that defend against any malware, “man-in-the-app” attacks (Trojan horse) and communication spoofing attacks. Retail, financial, entertainment and mHealth service providers planning to deploy secure mobile applications can ensure the highest level of security for their app and data with MatrixSSE.

(1) http://www.infosecurity-magazine.com/view/34882/digitally-signed-malware-sees-tripledigit-growth/

(2) http://www.theregister.co.uk/2013/06/17/lookout_badnews_iisi_malware/

About INSIDE Secure

INSIDE Secure (NYSE Euronext Paris FR0010291245 – INSD.PA) is a leading designer, developer and supplier of semiconductors, embedded software and platforms for secure transactions and digital security. INSIDE mobile NFC, secure payment and digital security products provide security for a wide range of information processing, storage and transmission applications. The company’s customers are found in a wide range of markets, including mobile payment, identification documents, access control, transit, electronic device manufacturing, pay television and mobile service operators. For more information, visit http://www.insidesecure.com

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today that Catchpoint Systems, Inc., a provider of innovative web and infrastructure monitoring solutions, has been named “Silver Sponsor” of SYS-CON's DevOps Summit at 18th Cloud Expo New York, which will take place June 7-9, 2016, at the Javits Center in New York City, NY. Catchpoint is a leading Digital Performance Analytics company that provides unparalleled insight into customer-critical services to help consistently deliver an amazing customer experience. Designed ...
Internet of @ThingsExpo, taking place June 6-8, 2017 at the Javits Center in New York City, New York, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @ThingsExpo New York Call for Papers is now open.
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT depl...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at Dell EMC, introduced a methodology for capturing, enriching and sharing data (and analytics) across the organization...
With all the incredible momentum behind the Internet of Things (IoT) industry, it is easy to forget that not a single CEO wakes up and wonders if “my IoT is broken.” What they wonder is if they are making the right decisions to do all they can to increase revenue, decrease costs, and improve customer experience – effectively the same challenges they have always had in growing their business. The exciting thing about the IoT industry is now these decisions can be better, faster, and smarter. Now ...
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, looked at differ...
"Splunk basically takes machine data and we make it usable, valuable and accessible for everyone. The way that plays in DevOps is - we need to make data-driven decisions to delivering applications," explained Andi Mann, Chief Technology Advocate at Splunk and @DevOpsSummit Conference Chair, in this SYS-CON.tv interview at @DevOpsSummit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
"Logz.io is a log analytics platform. We offer the ELK stack, which is the most common log analytics platform in the world. We offer it as a cloud service," explained Tomer Levy, co-founder and CEO of Logz.io, in this SYS-CON.tv interview at DevOps Summit, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
In his session at @DevOpsSummit at 19th Cloud Expo, Robert Doyle, lead architect at eCube Systems, will examine the issues and need for an agile infrastructure and show the advantages of capturing developer knowledge in an exportable file for migration into production. He will introduce the use of NXTmonitor, a next-generation DevOps tool that captures application environments, dependencies and start/stop procedures in a portable configuration file with an easy-to-use GUI. In addition to captur...
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackIQ...
"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.