Go to content Phone human-readable description of the message we trying to accomplish. Search human-readable description of the message we trying to accomplish. Map pin human-readable description of the message we trying to accomplish.

With security and IoT dominating headlines, and customers and consumers adopting smartphone-enabled technologies, IoT security will become a significant component of security budgets and strategies this year. In fact, Gartner predicts that hardware spending on consumer applications will total $546 billion, and the use of connected “things” in the enterprise will drive $868 billion in 2016.

Today organizations need to create a strong security offense.  As many say, the best offense is a good defense. The tight integration between whiteCryption and Trustonic does just that – offers a secure, simpler, faster and richer user experience for consumers. With Trustonic licensing our Cryptanium Code Protection and Secure Key Box software solutions they are building a hybrid solution: with their market leading hardware-enabled security solutions. The Trustonic Hybrid Protection (THP) product for smart devices enables developers to dramatically accelerate the implementation of the most advanced security capabilities available on a device. The added layer of protection delivers the next level of obfuscation, self-defense, and tamper resistance technology, providing application security to platforms where hardware-based security is not available. Now Trustonic customers can get the best security in a single product that secures a greater range of apps and devices without requiring customers to learn or use new APIs.

In today’s connected world, security solutions that we rely on, need to work harder to protect the people that depend on mobile devices and services. Security can no longer be considered optional, but rather as integral to the device’s reliable functioning. Software security controls need to take advantage of the hardware security capabilities and extend up through the device stack to continuously maintain the trusted computing base. Building security at the application level enables device designers and developers to configure systems to mitigate threats and ensure their platforms are safe.

The partnership between Trustonic and whiteCryption is uniquely positioned to implement and deliver security for IoT.

Related content

Korea’s KB Bank Uses Trustonic In-App Protection to Enhance Mobile Banking Experience

Using Trustonic Application Protection enables KB Bank to dramatically improve the authentication experience for users of its mobile banking app and allow secure high value transactions

2nd April, 2020 – Mobile cybersecurity leader, Trustonic, today announces the successful implementation by KB Kookmin Bank (KB Bank) of Trustonic Application Protection (TAP) to enable a simpler authentication experience for users of its KB Star Banking app.

Trustonic + Lookout – Advanced Mobile Security for Banking & Fintech Apps

The need for in-app protection for critical mobile apps is greater than ever. The partnership between Lookout and Trustonic brings together two of the most robust app security platforms on the market, delivering the advanced security and protection required by banks and fintechs wishing to offer PSD2-compliant services and Strong Customer Authentication (SCA) requirements.

EE Journal: Microchip SAM11L KPH & Kinibi-M

Adding connectivity to your embedded design opens up a whole new realm of security challenges. Inviting your device to the IoT requires careful attention to building a secure foundation. In this episode of Chalk Talk, Amelia Dalton chats with Anand Rangarajan from Microchip about the SAML11-KPH MCU and how it can help you develop your application without worrying about IoT security.

The Benefits of Trusted User Interface (TUI)

Trusted User Interfaces (TUIs) are the next big thing for securing critical mobile apps. The Trusted User Interface feature allows a Trusted Application to interact directly with the user via a common display and touch screen, completely isolated from the main device OS.

All Internet of Things posts
Back to top