Go to content Phone human-readable description of the message we trying to accomplish. Search human-readable description of the message we trying to accomplish. Map pin human-readable description of the message we trying to accomplish.

Trustonic Security Platforms celebrates landmark milestone four years after launch, reaching 1 billion devices and protecting more than 500 million applications worldwide.

Cambridge, UKDevice security and application security specialist, Trustonic has announced that, in the four-year period since the company launched, its Trusted Execution Environment (TEE) hardware security technology has now been embedded into more than one billion devices globally. This includes smartphones from most of the leading Android device makers worldwide, as well as wearables and other industrial and consumer (IoT) internet of things devices. This news reaffirms that the Trustonic TEE is the most widely-deployed TEE technology globally.

Trustonic TEE technology delivers security services to devices and applications, ensuring sensitive data is stored, processed and protected in an isolated, trusted environment within the main processor of a smartphone or any connected device. This offers security against software attacks by enforcing protection, confidentiality, integrity and data access rights. The Root of Trust also ensures that a trusted identity is preserved within the device, preventing fraudulent use or copying. Compared with other security environments on the device, the TEE also offers high processing speeds and a large amount of accessible memory.

Commenting on the milestone, Ben Cade, Founder and CEO of Trustonic, said: “In just four years, Trustonic has made the security benefits of the TEE available to the global mass market. Reaching this one billion TEE landmark is significant, not just for Trustonic, but for device manufacturers, providers of digital services and consumers everywhere. TEE technology, which offers the highest levels of on-device protection for digital applications and assets, without compromising performance or convenience for the end user, has now reached critical scale. We only anticipate demand for TEEs to continue growing, particularly following Google’s mandate for hardware-based protection for Android M onwards, to counter the continued rise in malware and hacking.”

Trustonic’s TEE is the only open TEE available. Uniquely, it permits third-party applications to be provisioned after the handset or device has been deployed, which opens up vast commercial opportunities for both device manufacturers and digital service providers. The latter will have the potential to dynamically add value to the end user by offering new secure services and functionality, once the device is already in their hands.

Related content

OPTOLANE Chooses Trustonic to Protect New Connected Medical Diagnostic Devices

Best-in-class cybersecurity technology born in the smartphone ecosystem used to secure sensitive patient data.

3rd December, 2019 – Device and application security leader Trustonic today announces that OPTOLANE has selected Trustonic Secured Platform (TSP) to bring security and trust to the company’s new connected medical diagnostic device. The product is primarily used at the point-of-care for early diagnosis and preventative healthcare, particularly for diagnosing cancer, infectious diseases and congenital abnormalities.


Casio Chooses Trustonic to Secure and Enhance Next-gen Smartwatches

Trustonic Secured Platform helps Casio protect new flagship wearable device

September 24, 2019 – Device and application security leader Trustonic today announces that Casio has selected Trustonic Secured Platform (TSP) to bring additional security and trust to its next-generation flagship wearable. The Casio PRO TREK Smart WSD-F21HR launched in August with a range of innovative features, including GPS, offline maps, heart rate and VO2 max measurement, designed for athletes and consumers who enjoy the outdoors.


The Benefits of Trusted User Interface (TUI)

Trusted User Interfaces (TUIs) are the next big thing for securing critical mobile apps. The Trusted User Interface feature allows a Trusted Application to interact directly with the user via a common display and touch screen, completely isolated from the main device OS.


What is a Trusted Execution Environment (TEE)?

A Trusted Execution Environment (TEE) is an environment for executing code, in which those executing the code can have high levels of trust in that surrounding environment, because it can ignore threats from the rest of the device.


What is TrustZone?

Arm® TrustZone® technology provides a cost-effective methodology to isolate security critical components in a system, by hardware separating a rich operating system, from a much smaller, secure operating system.

All Trusted Execution Environment (TEE) posts
Back to top