Go to content Phone human-readable description of the message we trying to accomplish. Search human-readable description of the message we trying to accomplish. Map pin human-readable description of the message we trying to accomplish.

With security and IoT dominating headlines, and customers and consumers adopting smartphone-enabled technologies, IoT security will become a significant component of security budgets and strategies this year. In fact, Gartner predicts that hardware spending on consumer applications will total $546 billion, and the use of connected “things” in the enterprise will drive $868 billion in 2016.

Today organizations need to create a strong security offense.  As many say, the best offense is a good defense. The tight integration between whiteCryption and Trustonic does just that – offers a secure, simpler, faster and richer user experience for consumers. With Trustonic licensing our Cryptanium Code Protection and Secure Key Box software solutions they are building a hybrid solution: with their market leading hardware-enabled security solutions. The Trustonic Hybrid Protection (THP) product for smart devices enables developers to dramatically accelerate the implementation of the most advanced security capabilities available on a device. The added layer of protection delivers the next level of obfuscation, self-defense, and tamper resistance technology, providing application security to platforms where hardware-based security is not available. Now Trustonic customers can get the best security in a single product that secures a greater range of apps and devices without requiring customers to learn or use new APIs.

In today’s connected world, security solutions that we rely on, need to work harder to protect the people that depend on mobile devices and services. Security can no longer be considered optional, but rather as integral to the device’s reliable functioning. Software security controls need to take advantage of the hardware security capabilities and extend up through the device stack to continuously maintain the trusted computing base. Building security at the application level enables device designers and developers to configure systems to mitigate threats and ensure their platforms are safe.

The partnership between Trustonic and whiteCryption is uniquely positioned to implement and deliver security for IoT.

Related content

The Benefits of Trusted User Interface (TUI)

Trusted User Interfaces (TUIs) are the next big thing for securing critical mobile apps. The Trusted User Interface feature allows a Trusted Application to interact directly with the user via a common display and touch screen, completely isolated from the main device OS.

Hyundai to Demonstrate Digital Car Key Secured by Trustonic Application Protection at the New York Auto Show

Digital Key enables convenient and secure car-sharing on the 2020 Hyundai Sonata.

NEW YORK, USA, CAMBRIDGE, UK, April 9, 2019 – Mobile-device and application-security technology company Trustonic announced today that Hyundai Motor America will demonstrate its new Digital Key app, secured by Trustonic Application Protection, at the New York International Auto Show 2019. The Digital Key will launch with the all-new 2020 Hyundai Sonata in the fall.

Impressions from Huawei’s eco-Connect Europe conference

As part of the ongoing partnership between Trustonic and Huawei Consumer Business Group, I was kindly invited to attend the recent Huawei eco-Connect conference in Rome.

Huawei eco-Connect is Huawei’s annual flagship event for the European region. Its aim is to establish and promote an open, innovative and collaborative ICT ecosystem. Executives from all segments, thought leaders and product experts gathering to share their vision and discuss industry and technology trends and issues.

All Internet of Things posts
Back to top