ARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing. Pierre Garnier, COO
|
|
- Edith Day
- 6 years ago
- Views:
Transcription
1 ARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing Pierre Garnier, COO 1 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014
2 Jennifer Lawrence truly believes Smartphone should be more secure 2 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014
3 3 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014 The «9/11» of the Smartphone is coming
4 The security challenges that IoT and Mobile Computing Devices are facing Who is INSIDE Secure? Security within a hyper-connected world? Security world is changing! Security at the Heart of the System Security Solutions for Mobile, IoT and Anti-Counterfeiting 4 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014
5 A World Leader in Embedded Security for Mobile and Connected Devices $154.6M revenue in 2013, generated through the sale / licensing of secure microcontrollers (HW), HW IP and software An IPR portfolio of circa 700 patents Revenue CAGR : +25.5% Serving more than 100 blue chip customers on growing and diversified end-markets INSIDE Secure are shipping in over 300m devices per year 340 employees with European & U.S. development centers Supportive reference shareholders: Bpifrance (7.1%) and GIMV (12.5%) 5 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014
6 From Mobile Computing to the IoT world Billions of connected devices, enabling multiple day-to-day applications and services, managing many private information need to be Trusted 6 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014
7 Add-On Security Methods Have Failed Target Hit by Credit-Card Breach Customers Info May Have Been Stolen Over Black Friday Weekend Home Depot s Suspected Breach Looks Just Like the Target Hack The Wall Street Journal December 19, 2013 Bloomberg BusinessWeek September 02, 2014 DATA BREACHES IDENTITIES EXPOSED 93M The total number of breaches in 2013 was 62% greater than in IDENTITIES EXPOSED 552M DATA BREACHES 253 One month after Heartbleed first hit the headlines, 300,000 of the 600,000 servers originally affected remain vulnerable. white-hat' hacker Rob Graham 1 Symantec 2014 Internet Security Threat Report 7 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014
8 8 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014 Malware on the move
9 Smartphone Multiple Risks Source: Sophos 9 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014
10 The World of Security is changing From a world where any non-secure device/object was becoming (as a sudden) secure when connected to a smart card to a world of Embedded security Security need to the tightly embedded at the heart of any system, at the heart of the main processor of the device (e.g. Smartphone, IoT Device, etc) Security Architectures and Certification Schemes need to be re-invented. 10 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014
11 Security Levels to be adapted to the needs RichOS Apps RichOS TEE SE RichOS Apps are considered as lowest level of security The RichOS provide some security mechanisms for applications Protection again badly behaved applications The RichOS also protects itself with some SW mechanisms Protection against software attacks, basic attacks from the internet TEE leverages some hardware re-enforced protections provided by the host processors Efficient protection against software attacks, Trojan, Root kits Medium attacks from the device user But there is a need for security against Hardware attack Protection against hardware attacks on stolen devices Protect users and services providers credentials (secrete keys, certificates, Ids) Protection against User attacks Protect service providers assets 11 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014
12 Security at the Heart of the System Cloud Services Peer Device Strong User Authentication Strong Execution Environment Strong Cloud/Peer Auth./Communication EMBEDDED SECURE ELEMENT JAVACARD OS APPLETS CRYPTO-CELLS PACKET ENGINES RNGS SAFEZONE SECURITY TOOLKITS DATA ENCRYPTION EMBEDDED DRM EMBEDDED VPN DRM CLIENT VPN CLIENT MATRIX SSL PAYMENT SECURE TAMPER PROOF CHIPS SECURE IPs for COMPONENTS APPLICATION PROCESSOR PLATFORM OS (Android, ios, etc) APPLICATIONS END-to-END Provided by INSIDE Secure 12 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014
13 Key Drivers and Solutions for Mobile Security 1 Mobile Payment 2 Entertainment Content Protection 3 Enterprise «BYOD*» Secure Element Galaxy S4, S5 HCE Metaforic immunization software Ready for NFC adoption in any scenario with Visa and MasterCard certified solutions INSIDE Secure DRM solution in use by about 50 customers High value added services installed in about 200 handset models for 40 clients * Bring Your Own Device 13 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014
14 Secure Internet of Things : When toasters, cars, thermostats and fridges attack Recent news that a botnet army which sent 750,000 spam s included some refrigerators discovery of a Linux worm that can infect security cameras GIGAOM January 2014 security controller secure middleware SSL internet secure platform on a chip IPSec secure SSL Toolkits 14 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014
15 Anti-Counterfeiting and Brand Protection: every object has an identity Secure Database and Personalization Services Trusted VaultNFC Apps VPN Secure NFC Tags TEE Secure Communications with VPN 15 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014
16 Take aways The World of Security is changing from Connected security to Embedded security Security needs to be integrated at the heart of your system There are architectural and certification challenges ahead! All Security is a living process: Choose your solution carefully Choose your partners even more so INSIDE Secure designs, develops and sells embedded security systems for smartphones, tablets, and other devices connected to the Internet, in order to protect transactions, content, and communications. 16 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014
17 Thanks! Pierre Garnier 17 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014
GlobalPlatform Trusted Execution Environment (TEE) for Mobile
GlobalPlatform Trusted Execution Environment (TEE) for Mobile Kevin Gillick Executive Director, GlobalPlatform @GlobalPlatform_ www.linkedin.com/company/globalplatform GlobalPlatform Overview GlobalPlatform
More informationSecuring Today s Mobile Workforce
WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................
More informationIntroduction to Device Trust Architecture
Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform
More informationBeyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development
Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development Part1 - PSA Tech Seminars 2017 Agenda Platform Security Architecture Architecture overview Trusted Firmware-M IoT Threat
More informationTrustzone Security IP for IoT
Trustzone Security IP for IoT Udi Maor CryptoCell-7xx product manager Systems & Software Group ARM Tech Forum Singapore July 12 th 2017 Why is getting security right for IoT so important? When our everyday
More informationHow Next Generation Trusted Identities Can Help Transform Your Business
SESSION ID: SPO-W09B How Next Generation Trusted Identities Can Help Transform Your Business Chris Taylor Senior Product Manager Entrust Datacard @Ctaylor_Entrust Identity underpins our PERSONAL life 2
More informationAchieving End-to-End Security in the Internet of Things (IoT)
Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of
More informationTopics. Ensuring Security on Mobile Devices
Ensuring Security on Mobile Devices It is possible right? Topics About viaforensics Why mobile security matters Types of security breaches and fraud Anticipated evolution of attacks Common mistakes that
More informationSecurity in NFC Readers
Security in Readers Public Content and security, a different kind of wireless Under the hood of based systems Enhancing the security of an architecture Secure data exchange Information security goals Cryptographic
More informationHCE security implications. Analyzing the security aspects of HCE
HCE security implications Analyzing the security aspects of HCE January 8th, 2014 White paper - HCE security implications, analyzing the security aspects of HCE HCE security implications About the authors:
More informationGLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications
GLOBALPROTECT Prevent Breaches and Secure the Mobile Workforce GlobalProtect extends the protection of Palo Alto Networks Next-Generation Security Platform to the members of your mobile workforce, no matter
More informationTHE SONICWALL CLEAN VPN APPROACH FOR THE MOBILE WORKFORCE
THE SONICWALL CLEAN VPN APPROACH FOR THE MOBILE WORKFORCE A Clean VPN approach delivers layered defense-in-depth protection for the core elements of business communications. Abstract The consumerization
More informationhidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION
HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused
More informationSecuring the System with TrustZone Ready Program Securing your Digital World. Secure Services Division
Securing the System with TrustZone Ready Program Securing your Digital World Secure Services Division 1 ARM Secure Services Division Established in Q4 2010 To enable a market for secure applications and
More informationA Developer's Guide to Security on Cortex-M based MCUs
A Developer's Guide to Security on Cortex-M based MCUs 2018 Arm Limited Nazir S Arm Tech Symposia India Agenda Why do we need security? Types of attacks and security assessments Introduction to TrustZone
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Rob Coombs Security Marketing Director TechCon 11/10/15 Agenda Introduction Security Foundations on Cortex-M Security Foundations on Cortex-A Use cases
More informationTeradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 12.16 EB7178 DATA SECURITY Table of Contents 2 Data Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
More informationIT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA
IT Security Mandatory Solutions Andris Soroka 2nd of July, 2014 @LPS, RIGA Data Security Solutions business card Specialization IT Security IT Security services (consulting, audit, pen-testing, market
More informationThomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017
Thomas Lippert Principal Product Manager Sophos Mobile Spring 2017 Market Overview Trends Security or data breaches involving mobile devices are on the rise More people use mobile devices for work than
More informationMobile Security / Mobile Payments
Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY
More informationNetwork Security Fundamentals
Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 5 Viruses & Worms, Botnets, Today s Threats Viruses
More informationPerimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN
T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN Perimeter Defenses Enterprises need to take their security strategy beyond stacking up layers of perimeter defenses to building up predictive
More informationSecure Application Trend in Smartphones. STMicroelectronics November 2017
Secure Application Trend in Smartphones STMicroelectronics November 2017 A global semiconductor leader 2016 revenues of $6.97B Listed: NYSE, Euronext Paris and Borsa Italiana, Milan Who We Are 2 Research
More informationCh 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated
Ch 1: The Mobile Risk Ecosystem CNIT 128: Hacking Mobile Devices Updated 1-12-16 The Mobile Ecosystem Popularity of Mobile Devices Insecurity of Mobile Devices The Mobile Risk Model Mobile Network Architecture
More informationSecuring IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region
Securing IoT devices with STM32 & STSAFE Products family Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region 2 The leading provider of products and solutions for Smart Driving and
More informationMitigating Security Breaches in Retail Applications WHITE PAPER
Mitigating Security Breaches in Retail Applications WHITE PAPER Executive Summary Retail security breaches have always been a concern in the past, present and will continue to be in the future. They have
More informationEthical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition
Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition Chapter 7 Hacking Mobile Phones, PDAs, and Handheld Devices Objectives After completing this chapter,
More informationBlackjacking. Daniel Hoffman. Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise. Wiley Publishing, Inc.
Blackjacking Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise Daniel Hoffman Wiley Publishing, Inc. Contents About the Author Acknowledgments Introduction Chapter 1 Understanding
More informationUnderstanding Persistent Connectivity: How IoT and Data Will Impact the Connected Data Center
Understanding Persistent Connectivity: How IoT and Data Will Impact the Connected Data Center Speaker: Bill Kleyman, EVP of Digital Solutions - Switch AFCOM and Informa Writer/Contributor (@QuadStack)
More informationLaunch Smart Products With End-to-End Solutions You & Your Customers Can Trust
Solution Brief: Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust DeviceTone, our ready to run "connect, manage and enable" solution for product companies, makes secure connectivity,
More informationMobile App Security and Malware in Mobile Platform
Mobile App Security and Malware in Mobile Platform Siupan Chan Sales Engineering Manager, Greater China 23 September, 2016 The Mobile Security Epidemic 2 A Radical Shift is Occurring When will your organization
More informationInternet of Things real life cases Alex Ahlberg
Internet of Things real life cases Alex Ahlberg Sales Manager, Symantec Finland & Baltics Symantec At a Glance 175M endpoints under protection $4.6B annual revenue 2123 patents 385,000 customers worldwide
More informationGoogle on BeyondCorp: Empowering employees with security for the cloud era
SESSION ID: EXP-F02 Google on BeyondCorp: Empowering employees with security for the cloud era Jennifer Lin Director, Product Management, Security & Privacy Google Cloud What is BeyondCorp? Enterprise
More information$263 WHITE PAPER. Flexible Key Provisioning with SRAM PUF. Securing Billions of IoT Devices Requires a New Key Provisioning Method that Scales
WHITE PAPER Flexible Key Provisioning with SRAM PUF SRAM PUF Benefits Uses standard SRAM Device-unique keys No secrets reside on the chip No key material programmed Flexible and scalable Certifications:
More informationMobile Devices prioritize User Experience
Mobile Security 1 Uniqueness of Mobile Mobile Devices are Shared More Often Mobile Devices are Used in More Locations Mobile Devices prioritize User Experience Mobile Devices have multiple personas Mobile
More informationDigital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans
Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October 2014 Frazier D. Evans Evans_Frazier@bah.com There are four key areas that need to be investigated when talking
More informationENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing
WHITE PAPER Endpoint Security and the Case For Automated Sandboxing A World of Constant Threat We live in a world of constant threat. Every hour of every day in every country around the globe hackers are
More informationSecurity Solutions for Mobile Users in the Workplace
Security Solutions for Mobile Users in the Workplace 1 1 Multitasking means multiple devices for busy end users Introduction Cloud computing helps organizations operate with less infrastructure, reducing
More informationManaging EUC Threats. 3 Simple Ways To Improve Endpoint SECURITY
Managing EUC Threats 3 Simple Ways To Improve Endpoint SECURITY Contents SECTION 01: THE CHALLENGE... 2 Emerging Threats: The Endpoint Explosion SECTION 02: LESSONS LEARNED... 5 Learning from a Cybersecurity
More informationHow I Learned to Stop Worrying and Love the Internet of Things
SESSION ID: SSC-W07 How I Learned to Stop Worrying and Love the Internet of Things Steven Sprague CEO Rivetz Corp @skswave The Big Shift Known Networks Ports Firewalls Packets SSL Known Devices Identity
More informationSecuring IoT with the ARM mbed ecosystem
Securing IoT with the ARM mbed ecosystem Xiao Sun / Senior Applications Engineer / ARM ARM mbed Connect / Shenzhen, China December 5, 2016 Lots of interest in IoT security Researchers are looking into
More informationStrong Authentication for Physical Access using Mobile Devices
Strong Authentication for Physical Access using Mobile Devices DoD Identity Protection and Management Conference May 15-17, 2012 Dr. Sarbari Gupta, CISSP, CISA sarbari@electrosoft-inc.com 703-437-9451
More informationProvisioning secure Identity for Microcontroller based IoT Devices
Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May
More informationTrusted Computing Today: Benefits and Solutions
Trusted Computing Today: Benefits and Solutions Brian D. Berger EVP Marketing & Sales Wave Systems Corp. bberger@wavesys.com Copyright 2009 Trusted Computing Group Agenda TCG Vision TCG Benefits Solution
More informationSophos. Allan Widell Channel Account Executive. 24. August 2017
Sophos Allan Widell Channel Account Executive 24. August 2017 Our Differentiated Model Focus on mid-market enterprises: over 50% of IT security market Complete, advanced, and highly effective security
More informationAzure Sphere Transformation. Patrick Ward, Principal Solutions Specialist
Azure Sphere Transformation Patrick Ward, Principal Solutions Specialist IoT @_pdubya pward@microsoft.com Microcontrollers (MCUs) LOW-COST, SINGLE CHIP COMPUTERS TMS1100: 300 KHz core, 2KB ROM, 64B RAM,
More informationMobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management
Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management June 29, 2011 1 Forward-Looking Statements This presentation
More informationMobile Device Security. Image from
Mobile Device Security Image from http://appaddict.net Examples of Mobile Devices - Phones ios (iphone), Android, Windows, etc. -USB devices - Tablets (ipad, Dell/HP running Windows, WebOS, etc.) This
More informationCombating Cyber Risk in the Supply Chain
SESSION ID: CIN-W10 Combating Cyber Risk in the Supply Chain Ashok Sankar Senior Director Cyber Strategy Raytheon Websense @ashoksankar Introduction The velocity of data breaches is accelerating at an
More informationNext Generation Authentication
Next Generation Authentication Bring Your Own security impact Dominique Dessy Sr. Technology Consultant 1 2012 DIGITAL UNIVERSE 1.8 ZETTABYTES 1,800,000,000,000,000,000,000 2 $ 3 4 Threat Landscape 60%
More informationMake security part of your client systems refresh
Make security part of your client systems refresh Safeguard your information with Dell Data Security Solutions while boosting productivity and reducing costs Your organization might have many reasons for
More informationMobile Security using IBM Endpoint Manager Mobile Device Management
Mobile Security using IBM Endpoint Manager Mobile Device Management Mahendra Chopra Security Solution Architect @ IBM CIO Lab, Innovation mahendra.chopra@in.ibm.com Agenda Market Trends Mobile Security?
More informationMobility, Security Concerns, and Avoidance
By Jorge García, Technology Evaluation Centers Technology Evaluation Centers Mobile Challenges: An Overview Data drives business today, as IT managers and security executives face enormous pressure to
More informationRetail Security in a World of Digital Touchpoint Complexity
Retail Security in a World of Digital Touchpoint Complexity Author Greg Buzek, President of IHL Services Sponsored by Cisco Systems Inc. Featuring industry research by Previously in part 1 and part 2 of
More informationPCI DSS 3.1 is here. Are you ready? Mike Goldgof Sr. Director Product Marketing
PCI DSS 3.1 is here. Are you ready? Mike Goldgof Sr. Director Product Marketing 1 WhiteHat Security Application Security Company Leader in the Gartner Magic Quadrant Headquartered in Santa Clara, CA 320+
More informationBYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-BOaRDING and Securing DEVICES IN YOUR Corporate NetWORk PrepaRING YOUR NetWORk to MEEt DEVICE DEMaND The proliferation of smartphones and tablets brings increased
More informationCybersecurity and Communications Based Train Control
Cybersecurity and Communications Based Train Control RAHEEL QURESHI CYBERSECURITY AUTHORITY URBAN RAIL SIGNALLING (URS) 2016 Thales Canada, Transportation Solutions. All rights reserved. Passing on or
More informationSimple and Powerful Security for PCI DSS
Simple and Powerful Security for PCI DSS The regulations AccessEnforcer helps check off your list. Most merchants think they are too small to be targeted by hackers. In fact, their small size makes them
More informationTHE NEW LANDSCAPE OF AIRBORNE CYBERATTACKS
SESSION ID: MBS-W04 THE NEW LANDSCAPE OF AIRBORNE CYBERATTACKS Nadir Izrael CTO & Co-Founder Armis, Inc. Ben Seri Head of Research Armis, Inc. Placeholder Slide: Image of spread of infection Placeholder
More informationAccelerating into the Turn
Accelerating into the Turn Steve Pataky, SVP and Chief Revenue Officer FEBRUARY 21, 2018 Thank You With over 26 years of experience, SonicWall is recognized as a Network Security leader in the Cyber Arms
More informationBuilding Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.
Building Trust in a Digital World Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd. 2 Global incidents Equivalent of 117,339 incoming attacks per day, everyday Total number
More informationMOBILE THREAT LANDSCAPE. February 2018
MOBILE THREAT LANDSCAPE February 2018 WHERE DO MOBILE THREATS COME FROM? In 2017, mobile applications have been a target of choice for hackers to access and steal data, with 86% of mobile threats coming
More informationBRING YOUR OWN DEVICE: POLICY CONSIDERATIONS
WHITE PAPER BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS INTRODUCTION As more companies embrace the broad usage of individual liable mobile devices or BYOD for access to corporate applications and data,
More informationEBV Personalization Services for Security Devices
Infineon Security Partner Network Partner Use Case EBV Personalization Services for Security Devices Secured generation and storage of personalized OEM certificates in the OPTIGA Trust E for sophisticated
More informationXenApp, XenDesktop and XenMobile Integration
XA, XD and XM Integration XenApp, XenDesktop and XenMobile Integration for a Comprehensive Mobility and Digital Workspace Solution Citrix.com 1 Desktop and application virtualization have enhanced mobility
More informationBig Trends in IT and how they shape Security. Gerhard Eschelbeck, CTO
Big Trends in IT and how they shape Security Gerhard Eschelbeck, CTO Industry Trends #1 The Rapidly Growing Demand for Processing and Data Storage Google processes 20 PB a day London s traffic cams processing
More informationCYBERSECURITY AND SERVICE STATIONS
CYBERSECURITY AND SERVICE STATIONS Hocine AMEUR and Simon Elrharbi hocine.ameur@coessi.fr simon.elrharbi@coessi.fr 1 AGENDA 1. WHO WE ARE 2. IoT and Security 3. Connected service stations security 4. How
More informationGEARS + CounterACT. Advanced Compliance Enforcement for Healthcare. December 16, Presented by:
Advanced Compliance Enforcement for Healthcare Presented by: December 16, 2014 Adam Winn GEARS Product Manager OPSWAT Kevin Mayer Product Manager ForeScout Agenda Challenges for the healthcare industry
More informationMeeting FFIEC Meeting Regulations for Online and Mobile Banking
Meeting FFIEC Meeting Regulations for Online and Mobile Banking The benefits of a smart card based authentication that utilizes Public Key Infrastructure and additional mechanisms for authentication and
More informationStrong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing
More informationCardOS Secure Elements for Smart Home Applications
Infineon Security Partner Network Partner Use Case CardOS Secure Elements for Smart Home Applications Using cryptographic functionality provided by ATOS to secure embedded platforms in Smart Home applications.
More informationThe Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions
The Mobile Risk Management Company Overview of Fixmo and Mobile Risk Management (MRM) Solutions Company Proprietary Information Copyright Fixmo Inc., 2012 Introduction to Fixmo Founded on a simple idea:
More informationEMERGING TRENDS AROUND AUTHENTICATION
EMERGING TRENDS AROUND AUTHENTICATION Michelle Salway Senior Director Sales - EMEA May 2017 1 BIOMETRICS: A GIFT FROM THE DEVICE MAKERS & BIOMETRIC VENDORS DEVICES ARE RICH IN AUTHENTICATION CAPABILITIES,
More informationPrivilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer
Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing
More informationFIREWALL BEST PRACTICES TO BLOCK
Brought to you by Enterprie Control Systems FIREWALL BEST PRACTICES TO BLOCK Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting
More informationSECURING DEVICES IN THE INTERNET OF THINGS
SECURING DEVICES IN THE INTERNET OF THINGS EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including steep financial losses, damage
More informationLessons from the Human Immune System Gavin Hill, Director Threat Intelligence
Lessons from the Human Immune System Gavin Hill, Director Threat Intelligence HLA ID: 90FZSBZFZSB 56BVCXVBVCK 23YSLUSYSLI 01GATCAGATC Cyber space is very similar to organic realm Keys & certificates are
More informationSecuring Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication
Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication Strong Authentication is the Foundation for Securing Mobile Access Executive Summary The consumerization
More informationIt s About the Data, Stupid.
Next Presentation Begins at 16:40 It s About the Data, Stupid. Salo Fajer, Chief Technology Officer It s About the Data, Stupid. Salo Fajer, Chief Technology Officer First, allow me to explain my session
More informationBYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips
Table of Contents Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips 2 Current State of BYOD in the Enterprise Defining BYOD Bring-Your-Own-Device (BYOD): a business practice
More informationEDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC
EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE 6 2018 PUBLIC PUBLIC 2 Key concerns with IoT.. PUBLIC 3 Why Edge Computing? CLOUD Too far away Expensive connectivity
More informationLookout's cybersecurity predictions
LOOKING FORWARD AND LOOKING BACK: Lookout's cybersecurity predictions by Kevin Mahaffey Every year, cybersecurity pundits cast predictions for which issues will make headlines in the year to come. We ve
More informationSECURING DEVICES IN THE INTERNET OF THINGS
SECURING DEVICES IN THE INTERNET OF THINGS WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7
1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7 ORACLE PRODUCT LOGO 20. oktober 2011 Hotel Europa Sarajevo Platform
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationVisa Inc Investor Day. Technology at Visa. Rajat Taneja EVP, Technology and Operations
Visa Inc. 2017 Investor Day Technology at Visa Rajat Taneja EVP, Technology and Operations Key Takeaways Technology is a vital pillar of Visa s business The Visa network is engineered to provide unmatched
More informationMobile Devices as Identity Carriers. Pre Conference Workshop October 14 th 2013
Mobile Devices as Identity Carriers Pre Conference Workshop October 14 th 2013 Mobile Market Worldwide Smartphones Market by OS (in thousands of units) 1,400,000 1,200,000 1,000,000 800,000 600,000 400,000
More informationWhat Dropbox Can t Do For Your Business
What Dropbox Can t Do For Your Business 33 Things to Consider When Choosing a Secure File Sharing and Collaboration Service for Your Business A Soonr White Paper Executive Summary The need for a well-rounded
More informationKaspersky Small Office Security 5. Product presentation
Kaspersky Small Office Security 5 Product presentation CONTENTS 1 Target audience challenges and product info 3 Selling tips 2 4 Product overview Competitive overview 2 SMALL COMPANIES CHALLENGES General
More informationSay Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER
Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER FORTINET Say Yes to BYOD PAGE 2 Introduction Bring Your Own Device (BYOD) and consumerization
More informationMobile Device Management: A Real Need for the Mobile World
Mobile Device Management: A Real Need for the Mobile World In today s modern workplace, employees are utilizing a variety of mobile devices both in and out of the office. Gone are the days when employees
More informationProtecting Keys/Secrets in Network Automation Solutions. Dhananjay Pavgi, Tech Mahindra Ltd Srinivasa Addepalli, Intel
Protecting Keys/Secrets in Network Automation Solutions Dhananjay Pavgi, Tech Mahindra Ltd Srinivasa Addepalli, Intel Agenda Introduction Private Key Security Secret Management Tamper Detection Summary
More informationSecuring Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013
Securing Wireless Mobile Devices Lamaris Davis East Carolina University 11/15/2013 Attract As more employees prefer to use mobile devices in the workplace, organizations are starting to adopt the Bring
More informationDate: 13 June Location: Sophia Antipolis. Integrating the SIM. Dr. Adrian Escott. Qualcomm Technologies, Inc.
Date: 13 June 2018 @qualcomm Location: Sophia Antipolis Integrating the SIM Dr. Adrian Escott Qualcomm Technologies, Inc. Agenda 1 2 3 4 5 6 Path to isim isim Size benefit Hardware Architecture Certification
More informationChanging face of endpoint security
Changing face of endpoint security S A N T H O S H S R I N I V A S A N C I S S P, C I S M, C R I S C, C E H, C I S A, G S L C, C G E I T D I R E C T O R S H A R E D S E R V I C E S, H C L T E C H N O L
More informationDelivering High-mix, High-volume Secure Manufacturing in the Distribution Channel
Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel Steve Pancoast Vice President, Engineering Secure Thingz Inc Rajeev Gulati Vice President and CTO Data IO Corporation 1
More informationWeak Spots Enterprise Mobility Management. Dr. Johannes Hoffmann
Weak Spots Enterprise Mobility Management Dr. Johannes Hoffmann Personal details TÜV Informationstechnik GmbH TÜV NORD GROUP Dr. Johannes Hoffmann IT Security Business Security & Privacy Main focus: Mobile
More informationBusiness Strategy Theatre
Business Strategy Theatre Security posture in the age of mobile, social and new threats Steve Pao, GM Security Business 01 May 2014 In the midst of chaos, there is also opportunity. - Sun-Tzu Security:
More informationMOBILE SECURITY OVERVIEW. Tim LeMaster
MOBILE SECURITY OVERVIEW Tim LeMaster tim.lemaster@lookout.com Your data center is in the cloud. Your users and customers have gone mobile. Starbucks is your fall-back Network. Your mobile device is a
More informationNew Software Blade and Cloud Service Prevents Zero-day and Targeted Attacks
New Software Blade and Cloud Service Prevents Zero-day and Targeted Attacks 1 WOULD YOU OPEN THIS ATTACHMENT? Over 90% of targeted emails use malicious file attachments as the payload or infection source
More information