Go to content Phone human-readable description of the message we trying to accomplish. Search human-readable description of the message we trying to accomplish. Map pin human-readable description of the message we trying to accomplish.

Only four years ago, the tablet market as we know it didn’t exist. Yet today, millions of people are using them, along with smartphones, to improve productivity in their personal and professional lives. However, enterprises are left with the headache of protecting sensitive data across multiple devices and user profiles. The BYOD trend has made it difficult to control and secure devices connecting to the enterprise.

Authentication is the first challenge of CISOs (Chief Information Security Officers). Past approaches have been what Gartner labels “heavy-handed”, with additional costs, complexity and restrictive data access policies. Although one-time code generators can bring strong two-factor authentication, using them disrupts workflow. That’s only the tip of the iceberg when it comes to protecting information in the enterprise. Protecting data as it’s used is even more problematic.

To address this situation, many vendors turn their attention to the device management interfaces of the operating system (OS), external software or mobile applications to provide effective security across all devices. However, this approach is like building castles on shifting sand – when the next spring tide of OSes roll in, the foundations will disappear.

Samsung and Symantec, have partnered with Trustonic, to tackle these issues head on, with hardware anchored security. Both use the Trustonic ‹t-base Trusted Execution Environment (TEE), to deliver innovative, enriched, simplified and consistent enterprise user experiences. The Symantec VIP app makes user authentication simple and secure, while the ‹t-base enabled Samsung Knox 2.0 framework offers greater control of access to sensitive business data.

We predict that over the next four years of Enterprise Mobility, it will be easier to use and unlock the full potential of enterprise data with hardware anchored security as found in Samsung Knox 2.0 and Symantec VIP apps.

Related content

The Benefits of Trusted User Interface (TUI)

Trusted User Interfaces (TUIs) are the next big thing for securing critical mobile apps. The Trusted User Interface feature allows a Trusted Application to interact directly with the user via a common display and touch screen, completely isolated from the main device OS.

What is a Trusted Execution Environment (TEE)?

A Trusted Execution Environment (TEE) is an environment for executing code, in which those executing the code can have high levels of trust in that surrounding environment, because it can ignore threats from the rest of the device.

What is TrustZone?

Arm® TrustZone® technology provides a cost-effective methodology to isolate security critical components in a system, by hardware separating a rich operating system, from a much smaller, secure operating system.

All Enterprise posts
Back to top