ARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing. Pierre Garnier, COO

Similar documents
GlobalPlatform Trusted Execution Environment (TEE) for Mobile

Securing Today s Mobile Workforce

Introduction to Device Trust Architecture

Beyond TrustZone PSA Reed Hinkel Senior Manager Embedded Security Market Development

Trustzone Security IP for IoT

How Next Generation Trusted Identities Can Help Transform Your Business

Achieving End-to-End Security in the Internet of Things (IoT)

Topics. Ensuring Security on Mobile Devices

Security in NFC Readers

HCE security implications. Analyzing the security aspects of HCE

GLOBALPROTECT. Key Usage Scenarios and Benefits. Remote Access VPN Provides secure access to internal and cloud-based business applications

THE SONICWALL CLEAN VPN APPROACH FOR THE MOBILE WORKFORCE

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

Securing the System with TrustZone Ready Program Securing your Digital World. Secure Services Division

A Developer's Guide to Security on Cortex-M based MCUs

Designing Security & Trust into Connected Devices

Teradata and Protegrity High-Value Protection for High-Value Data

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

Mobile Security / Mobile Payments

Network Security Fundamentals

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Secure Application Trend in Smartphones. STMicroelectronics November 2017

Ch 1: The Mobile Risk Ecosystem. CNIT 128: Hacking Mobile Devices. Updated

Securing IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region

Mitigating Security Breaches in Retail Applications WHITE PAPER

Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures, Second Edition

Blackjacking. Daniel Hoffman. Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise. Wiley Publishing, Inc.

Understanding Persistent Connectivity: How IoT and Data Will Impact the Connected Data Center

Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust

Mobile App Security and Malware in Mobile Platform

Internet of Things real life cases Alex Ahlberg

Google on BeyondCorp: Empowering employees with security for the cloud era

$263 WHITE PAPER. Flexible Key Provisioning with SRAM PUF. Securing Billions of IoT Devices Requires a New Key Provisioning Method that Scales

Mobile Devices prioritize User Experience

Digital Payments Security Discussion Secure Element (SE) vs Host Card Emulation (HCE) 15 October Frazier D. Evans

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing

Security Solutions for Mobile Users in the Workplace

Managing EUC Threats. 3 Simple Ways To Improve Endpoint SECURITY

How I Learned to Stop Worrying and Love the Internet of Things

Securing IoT with the ARM mbed ecosystem

Strong Authentication for Physical Access using Mobile Devices

Provisioning secure Identity for Microcontroller based IoT Devices

Trusted Computing Today: Benefits and Solutions

Sophos. Allan Widell Channel Account Executive. 24. August 2017

Azure Sphere Transformation. Patrick Ward, Principal Solutions Specialist

Mobile Security Overview Rob Greer, VP Endpoint Management and Mobility Product Management Dave Cole, Sr. Director Consumer Mobile Product Management

Mobile Device Security. Image from

Combating Cyber Risk in the Supply Chain

Next Generation Authentication

Make security part of your client systems refresh

Mobile Security using IBM Endpoint Manager Mobile Device Management

Mobility, Security Concerns, and Avoidance

Retail Security in a World of Digital Touchpoint Complexity

PCI DSS 3.1 is here. Are you ready? Mike Goldgof Sr. Director Product Marketing

BYOD: BRING YOUR OWN DEVICE.

Cybersecurity and Communications Based Train Control

Simple and Powerful Security for PCI DSS

THE NEW LANDSCAPE OF AIRBORNE CYBERATTACKS

Accelerating into the Turn

Building Trust in a Digital World. Brian Phelps, BSc CISSP Director of Advanced Solutions Group EMEA Thales UK, Ltd.

MOBILE THREAT LANDSCAPE. February 2018

BRING YOUR OWN DEVICE: POLICY CONSIDERATIONS

EBV Personalization Services for Security Devices

XenApp, XenDesktop and XenMobile Integration

Big Trends in IT and how they shape Security. Gerhard Eschelbeck, CTO

CYBERSECURITY AND SERVICE STATIONS

GEARS + CounterACT. Advanced Compliance Enforcement for Healthcare. December 16, Presented by:

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

Strong Security Elements for IoT Manufacturing

CardOS Secure Elements for Smart Home Applications

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

EMERGING TRENDS AROUND AUTHENTICATION

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

FIREWALL BEST PRACTICES TO BLOCK

SECURING DEVICES IN THE INTERNET OF THINGS

Lessons from the Human Immune System Gavin Hill, Director Threat Intelligence

Securing Personal Mobile Device Access to Enterprise IT and Cloud Assets with Strong Authentication

It s About the Data, Stupid.

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC

Lookout's cybersecurity predictions

SECURING DEVICES IN THE INTERNET OF THINGS

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

Google Identity Services for work

Visa Inc Investor Day. Technology at Visa. Rajat Taneja EVP, Technology and Operations

Mobile Devices as Identity Carriers. Pre Conference Workshop October 14 th 2013

What Dropbox Can t Do For Your Business

Kaspersky Small Office Security 5. Product presentation

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Mobile Device Management: A Real Need for the Mobile World

Protecting Keys/Secrets in Network Automation Solutions. Dhananjay Pavgi, Tech Mahindra Ltd Srinivasa Addepalli, Intel

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

Date: 13 June Location: Sophia Antipolis. Integrating the SIM. Dr. Adrian Escott. Qualcomm Technologies, Inc.

Changing face of endpoint security

Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel

Weak Spots Enterprise Mobility Management. Dr. Johannes Hoffmann

Business Strategy Theatre

MOBILE SECURITY OVERVIEW. Tim LeMaster

New Software Blade and Cloud Service Prevents Zero-day and Targeted Attacks

Transcription:

ARM European Technical Symposium The security challenges that IoT and Mobile Computing Devices are facing Pierre Garnier, COO 1 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014

Jennifer Lawrence truly believes Smartphone should be more secure 2 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014

3 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014 The «9/11» of the Smartphone is coming

The security challenges that IoT and Mobile Computing Devices are facing Who is INSIDE Secure? Security within a hyper-connected world? Security world is changing! Security at the Heart of the System Security Solutions for Mobile, IoT and Anti-Counterfeiting 4 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014

A World Leader in Embedded Security for Mobile and Connected Devices $154.6M revenue in 2013, generated through the sale / licensing of secure microcontrollers (HW), HW IP and software An IPR portfolio of circa 700 patents Revenue CAGR 2010 2013: +25.5% Serving more than 100 blue chip customers on growing and diversified end-markets INSIDE Secure are shipping in over 300m devices per year 340 employees with European & U.S. development centers Supportive reference shareholders: Bpifrance (7.1%) and GIMV (12.5%) 5 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014

From Mobile Computing to the IoT world Billions of connected devices, enabling multiple day-to-day applications and services, managing many private information need to be Trusted 6 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014

Add-On Security Methods Have Failed Target Hit by Credit-Card Breach Customers Info May Have Been Stolen Over Black Friday Weekend Home Depot s Suspected Breach Looks Just Like the Target Hack The Wall Street Journal December 19, 2013 Bloomberg BusinessWeek September 02, 2014 DATA BREACHES 156 2012 IDENTITIES EXPOSED 93M The total number of breaches in 2013 was 62% greater than in 2012 2013 IDENTITIES EXPOSED 552M DATA BREACHES 253 One month after Heartbleed first hit the headlines, 300,000 of the 600,000 servers originally affected remain vulnerable. white-hat' hacker Rob Graham 1 Symantec 2014 Internet Security Threat Report 7 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014

8 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014 Malware on the move

Smartphone Multiple Risks Source: Sophos 9 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014

The World of Security is changing From a world where any non-secure device/object was becoming (as a sudden) secure when connected to a smart card to a world of Embedded security Security need to the tightly embedded at the heart of any system, at the heart of the main processor of the device (e.g. Smartphone, IoT Device, etc) Security Architectures and Certification Schemes need to be re-invented. 10 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014

Security Levels to be adapted to the needs RichOS Apps RichOS TEE SE RichOS Apps are considered as lowest level of security The RichOS provide some security mechanisms for applications Protection again badly behaved applications The RichOS also protects itself with some SW mechanisms Protection against software attacks, basic attacks from the internet TEE leverages some hardware re-enforced protections provided by the host processors Efficient protection against software attacks, Trojan, Root kits Medium attacks from the device user But there is a need for security against Hardware attack Protection against hardware attacks on stolen devices Protect users and services providers credentials (secrete keys, certificates, Ids) Protection against User attacks Protect service providers assets 11 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014

Security at the Heart of the System Cloud Services Peer Device Strong User Authentication Strong Execution Environment Strong Cloud/Peer Auth./Communication EMBEDDED SECURE ELEMENT JAVACARD OS APPLETS CRYPTO-CELLS PACKET ENGINES RNGS SAFEZONE SECURITY TOOLKITS DATA ENCRYPTION EMBEDDED DRM EMBEDDED VPN DRM CLIENT VPN CLIENT MATRIX SSL PAYMENT SECURE TAMPER PROOF CHIPS SECURE IPs for COMPONENTS APPLICATION PROCESSOR PLATFORM OS (Android, ios, etc) APPLICATIONS END-to-END Provided by INSIDE Secure 12 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014

Key Drivers and Solutions for Mobile Security 1 Mobile Payment 2 Entertainment Content Protection 3 Enterprise «BYOD*» Secure Element Galaxy S4, S5 HCE Metaforic immunization software Ready for NFC adoption in any scenario with Visa and MasterCard certified solutions INSIDE Secure DRM solution in use by about 50 customers High value added services installed in about 200 handset models for 40 clients * Bring Your Own Device 13 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014

Secure Internet of Things : When toasters, cars, thermostats and fridges attack Recent news that a botnet army which sent 750,000 spam emails included some refrigerators discovery of a Linux worm that can infect security cameras GIGAOM January 2014 security controller secure middleware SSL internet secure platform on a chip IPSec secure SSL Toolkits 14 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014

Anti-Counterfeiting and Brand Protection: every object has an identity Secure Database and Personalization Services Trusted VaultNFC Apps VPN Secure NFC Tags TEE Secure Communications with VPN 15 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014

Take aways The World of Security is changing from Connected security to Embedded security Security needs to be integrated at the heart of your system There are architectural and certification challenges ahead! All Security is a living process: Choose your solution carefully Choose your partners even more so INSIDE Secure designs, develops and sells embedded security systems for smartphones, tablets, and other devices connected to the Internet, in order to protect transactions, content, and communications. 16 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014

Thanks! Pierre Garnier pgarnier@insidesecure.com 17 INVESTORS INSIDE Secure PRESENTATION ARM European Technical SEPTEMBER Symposium 2012 December 4, 2014