Securing Mobile Devices with Advanced Hardware Technology
Though highly advanced in some of the aspects, mobile software protection is nearing its limit. Because this form of security is based on a software protecting another software, it somehow fails to be as reliable as hardware-backed protection. Though risk management teams try to deploy such technologies, due to their limited user access capabilities, application developers always work hard to offer flexible solutions and harness true hardware-based security.
A widely adopted solution to thwart these challenges is the Trusted Execution Environment (TEE) that offers hardware-based mobile security without increasing a device's bill of materials. Standardized by GlobalPlatform—a non-profit organization that creates and publishes secure chip technology specifications—the TEE is a secure area of the main processor where mobile applications can seamlessly run. This technology is being used extensively across enterprises such the ones in fintech spaces. Providing hardware isolation from operating systems such as Android that protect applications’ code, logic and data, the TEE is an operating environment that exists on the main application processor of a device. Even on compromised devices, TEE provides enhanced application protection.
Unlike other discrete hardware-secured environments, applications running in the TEE can access a device's computing power and memory. In addition, it prevents malware from stealing credentials or mimicking user interaction by enabling only privileged access to peripherals like touch-screen or fingerprint sensors. Leading organizations across the globe have developed innovative tools to enable the seamless development of applications targeted at TEE. Moreover, rather than redeveloping a complete mobile application, isolating the sensitive components into a separate trusted application that works within TEE makes it faster and better.
By John Kamin, EVP and CIO, Old National Bancorp
By Gregg T. Martin, VP & CIO, Arnot Health
By Dave Doyle, CIO & SVP, IT, Regal Entertainment Group
By Sergey Cherkasov, CIO, PhosAgro
By Adrian Mebane, VP-Global Ethics & Compliance, The Hershey...
By Mike Fitton, Wireless Business Unit Director, Altera
By Jim Kaskade, VP and GM, Big Data & Analytics, CSC
By Thomas Musgrave, EVP & CIO, AmeriCold Logistics
By Vin Sharma, Director, Strategic Planning & Marketing, Big...
By Federico Flórez, Chief Information & Innovation Officer,...
By Barbara Adams, VP, Innovative Technology Solutions, Texas...
By John Mason, CIO, Bottomline Technologies
By Jamshid Khazenie, CTO, USA Today Network / Gannett
By Miguel Gamino, CIO & Executive Director-Department of...
By Bill Schimikowski, VP, Customer Experience, Fidelity...
By Tom Bressie, Vice President, Oracle Cloud
By John Landwehr, Public Sector CTO, Adobe
By Aaron Gette, CIO, The Bay Club Company
By Denise Zabawski, CIO, Nationwide Children's Hospital
By Amit Bahree, Executive, Global Technology and Innovation,...