Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Mobile

12/20/2012
06:38 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Trustonic Provides New Standard Of Trust And Security For Connected Device

Company will focus on the development of a GlobalPlatform compliant Trusted Execution Environment

London, UK – Trustonic, the new company formed by ARM, Gemalto and Giesecke & Devrient (G&D), has launched as a new standard security provider to address the increasing need for trust built into smart connected devices. The company's technology enables service providers to innovate, expand and simplify user experiences in areas such as enterprise, commerce, payments and entertainment.

Trustonic is proud to name key industry partners at launch include 20th Century Fox Home Entertainment, Cisco, Discretix, Good Technology, INSIDE Secure, Irdeto, MasterCard, NVIDIA, Samsung Electronics, Sprint, Symantec, and Wave Systems.

Trustonic CEO, Ben Cade, said: "Trustonic builds upon decades of experience between ARM, Gemalto and G&D in developing secure technology for connected devices. The launch of Trustonic marks a turning point in our connected world. It will enable us to trust our smart connected devices to protect us as they deliver essential services and innovative user experiences."

The company will focus on the development of a GlobalPlatform compliant Trusted Execution Environment (TEE), which will offer a common security standard for connected devices. The TEE will be built upon ARM TrustZone® technology found at the heart of today's leading system-on-chips, combined with leading security software and management systems contributed by Gemalto and G&D. Services that require high trust in people's connected devices can gain access to the TEE on demand.

Trustonic will enable a connected device experience that begins and ends in complete security.

· Consumers will benefit from enhanced services; they will enjoy content on any screen, experience simpler, faster and safer payments and be able to use their device of choice at home or work.

· Service providers will be able to trust in people's devices offering customers the services they want on the smart devices of their choice.

· Network operators have the option to incorporate revenue generating value added services, such as enterprise security, payment services, and convergent service charging, to existing contracts.

· Electronic device makers can integrate an application and service-independent security platform that isolates and protects sensitive assets such as passcodes, fingerprints and certificates, all of which enrich, expand and accelerate people's digital lives with a seamless user experience.

· Silicon partners will benefit from embedded security at the core of their system-on-chips that will attract high value services.

Trustonic operates an open business model, allowing device manufacturers to incorporate the TEE security technology into their own products while also enabling service providers to activate these capabilities later based on the services that people desire. The company's technology, business model, and focus on open standards provide a consistent trusted foundation to support a vibrant ecosystem of partners.

Trustonic's management team draws on a pool of executive talent with substantial and varied industry experience. Joining CEO Ben Cade are:

· Jon Geater, Chief Technology Officer

· Olivier Leger, Executive Vice President – Sales and Marketing

· Stephan Spitz, Executive Vice President – Engineering

· Chris Jones, Chief Operating Officer

Trustonic will headquarter in Cambridge (UK), with offices across Asia, Europe and North America.

About Trustonic

Trust. It's a simple word but a critical concept – especially when it comes to our connected lives... Without trust, the world is a more difficult place; when we can't trust it's harder to work, socialise, shop and even enjoy the entertainment we love. Bolt-on security causes friction and slows down our mobile lives, but with integral trust, we speed freely on our way to doing some pretty amazing things.

Trustonic integrates a new level of security directly into the connected devices closest to us. By securing trust directly into the devices through which we access our connected world, Trustonic is simplifying everything from mobile shopping to entertainment to collaborating with colleagues. That foundation of trust means it's even easier to do more of the things that make us who we are.

That's why companies like 20th Century Fox Home Entertainment, Cisco, Discretix, Good Technology, INSIDE Secure, Irdeto, MasterCard, NVIDIA, Samsung Electronics, Sprint, Symantec, and Wave Systems count on Trustonic to protect and unleash a wide variety of powerful, personalised services on your devices.

To learn more about Trustonic and how it's making your connected world a better place visit us at www.trustonic.com

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-15596
PUBLISHED: 2020-08-12
The ALPS ALPINE touchpad driver before 8.2206.1717.634, as used on various Dell, HP, and Lenovo laptops, allows attackers to conduct Path Disclosure attacks via a "fake" DLL file.
CVE-2020-15868
PUBLISHED: 2020-08-12
Sonatype Nexus Repository Manager OSS/Pro before 3.26.0 has Incorrect Access Control.
CVE-2020-17362
PUBLISHED: 2020-08-12
search.php in the Nova Lite theme before 1.3.9 for WordPress allows Reflected XSS.
CVE-2020-17449
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS via the error_log file.
CVE-2020-17450
PUBLISHED: 2020-08-12
PHP-Fusion 9.03 allows XSS on the preview page.