ENHANCING HCE MOBILE PAYMENTS WITH TEEs

January 1, 2019

This white paper explains the use of Trusted Execution Environments (TEEs) in the context of HCE mobile payments and explores why companies deploying HCE mobile payment solutions should consider using TEEs to enable a higher level of security and to minimize the possibility of attacks. Dejamobile, in collaboration with Cartes Bancaires and Trustonic, is currently working on an innovative Generic Secure Trusted Application, leveraging the capabilities of the TEE with the aim of strengthening the security of HCE mobile payments. An industry first initiative in the cybersecurity market.

Spotlight

Vigilant LLC.

Vigilant serves customers in the automotive, healthcare, financial, legal, and general business industries as a full- service IT provider, specializing in business IT operations and cyber security. We operate with the belief that IT should fit into your business, instead of fitting your business into IT. Vigilant's CyberDNA platform gives its customers real-time cyber threat alerts, policy adherence, malware analysis, and immediate correlation of their logging against Vigilant's distributed cyber intelligence network. We let you know who is attacking, where they are attacking from and what they are doing.

OTHER WHITEPAPERS
news image

Optimizing Your Zero Trust Environment for Secure Video Conferencing

whitePaper | July 4, 2023

We’ve all heard the buzz around the virtual water cooler that Zero Trust Architectures are The Next Big Thing in network security, but what do we really know about them? And, perhaps more relevant to our discussion today, why should you care? This white paper looks at how and why Zero Trust (ZT) defines a data-centric security model and what that means in a real-time production environment. We build on that conversation to take a deeper look at how Pexip's video conferencing platform integrates with your existing ZT strategy and can even give you some new ZT concept ideas to consider.

Read More
news image

MEC security; Status of standards support and future evolutions

whitePaper | September 28, 2022

The present White Paper will focus on MEC (Multi-access Edge Computing) technologies and intends to explore security-related use cases and requirements with the aim of identifying aspects of security where the nature of edge computing results in insufficient industry approaches to cloud security. Edge computing environments are by nature characterized by a complex multi-vendor, multi-supplier, multi-stakeholder ecosystem of equipment including both HW and SW devices. Given this overall level of system heterogeneity, the areas of security, trust, and privacy are key topics for the edge environments. Finally, the advent of edge cloud federations and the presence of (far) edge devices, e.g., in Internet-ofThings environments, requires tackling MEC security with an end-to-end (E2E) approach by leveraging existing standards relevant in the area, as carefully selected to be applicable in edge computing systems.

Read More
news image

Privileged Remote Access Security in Cloud Whitepaper

whitePaper | May 5, 2022

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your organization stay secure and compliant, while improving the efficiency and success of your organization with a better user experience.

Read More
news image

2023 Cloud Security Trends | Sponsored by AWS Marketplace

whitePaper | January 18, 2023

In the past few years, major cloud providers are improving their security controls for customers and increasing visibility into their security solutions. Emerging trends such as endpoint detection and response and Zero Trust have focused the security community on the capabilities and services of both cloud and solution providers.

Read More
news image

Apple Platform Security

whitePaper | May 26, 2022

Apple designs security into the core of its platforms. Building on the experience of creating the world’s most advanced mobile operating system, Apple has created security architectures that address the unique requirements of mobile, watch, desktop, and home.

Read More
news image

Understanding Ransomware and Strategies to Defeat it

whitePaper | March 5, 2020

Held Hostage in Hollywood: In February 2016 the Hollywood Presbyterian Medical Center, in Los Angeles, paid a ransom of about US$17,000 to hackers who infiltrated and disabled its computer network with ransomware. The hospital paid the ransom of 40 Bitcoins (currently worth about $16,664) after a “network infiltration” began on February 5, when employees reported being unable to access the hospital’s network and electronic medical records system. “The malware locked access to certain computer systems and prevented us from sharing communications electronically,” said hospital CEO Allen Stefanek.

Read More

Spotlight

Vigilant LLC.

Vigilant serves customers in the automotive, healthcare, financial, legal, and general business industries as a full- service IT provider, specializing in business IT operations and cyber security. We operate with the belief that IT should fit into your business, instead of fitting your business into IT. Vigilant's CyberDNA platform gives its customers real-time cyber threat alerts, policy adherence, malware analysis, and immediate correlation of their logging against Vigilant's distributed cyber intelligence network. We let you know who is attacking, where they are attacking from and what they are doing.

Events