INGATE

From The Sip Trunking Experts

TMCNet:  INSIDE Secure and Intrinsic-ID team to bring a new level of security to cloud-based transactions; INSIDE Secure microcontrollers power Intrinsic-ID's Saturnus cloud security application

[November 20, 2013]

INSIDE Secure and Intrinsic-ID team to bring a new level of security to cloud-based transactions; INSIDE Secure microcontrollers power Intrinsic-ID's Saturnus cloud security application

(M2 PressWIRE Via Acquire Media NewsEdge) INSIDE Secure is at Cartes 2013 in Paris today and tomorrow, at booth 3D188 Aix-en-Provence, France and Eindhoven, Netherlands, November 20, 2013 - INSIDE Secure (NYSE Euronext: INSD) and Intrinsic-ID today announce they are bringing to market a new class of secure microcontrollers for smart cards and other applications that apply Hardware Intrinsic Security(TM) (HIS) to provide the highest levels of security for cloud-based transactions. Hardware Intrinsic Security technology uses the unique attributes of a device to extract high quality security keys, which in turn make the process very secure. By combining INSIDE's proven secure microcontroller designs with patented HIS technology from Intrinsic-ID, the companies will use the unique physical characteristics of each chip to protect cryptographic keys, and thus make the devices extremely hard to clone or reverse engineer. Modern ICs are unique due to the deep-submicron process variations manifested during manufacturing. The Intrinsic-ID HIS technology built into a device, such as a secure microcontroller, takes advantage of this physical uniqueness to enable cryptographic keys to be protected without their value having to be stored. Since no key material is present at rest, a very high security level can be achieved.


The HIS-based microcontroller chips will be packaged in multiple formats, the first being a USB smart card token to support the Intrinsic-ID Saturnus(R) secure cloud application. The Saturnus application runs on mobile phones, tablets and PCs. It offers total protection of digital data stored in the cloud. With Saturnus, files are encrypted before they leave the device and are uploaded to the cloud. The encryption keys are generated and managed inside the (USB) hardware security token plugged into the user device, making the Saturnus solution unique in the sense that key management is put back in the control of the end user.

"Through our cooperation with Intrinsic-ID, the undisputed leader in HIS technology, we will bring to market a new class of smart card chips and modules that support the Saturnus application," said Bernard Vian, executive vice president of the secure transactions division at INSIDE Secure. "HIS-based smart card tokens will be able to protect the digital assets users store in the cloud just as people today use a physical key to protect their home or car." Biometrics for Electronic Devices Perhaps best thought of as 'biometrics for electronic devices,' the HIS technology developed by Intrinsic-ID offers an extra layer of protection for the already substantial dedicated anti-cloning and other physical security protections offered by all INSIDE secure microcontroller products. "In addition to securing payment transactions, provisioning media content and protecting data in the cloud, the INSIDE Secure smart card chips and tokens will offer top-level security and key management flexibility to protect a whole new class of applications. These may include machine-to-machine, smart grid, track-and-trace and many other applications as they emerge from the rapidly developing Internet of Things," said Pim Tuylis, CEO at Intrinsic-ID. "We are thrilled to be working with INSIDE Secure to enable top-level security in cost-efficient ways to these fast-growing and potentially vast markets." About Intrinsic-ID Intrinsic-ID is the world leader in security IP cores and applications based on patented Hardware Intrinsic Security(TM) technology (HIS). In HIS, the cryptographic keys are extracted from the unique 'electronic fingerprint' of each device and used to offer a total protection of sensitive private and corporate data on mobile devices, embedded systems and in the cloud. Intrinsic-ID is headquartered in Eindhoven, Netherlands and has sales offices in San Jose, Tokyo and Seoul. For more information, visit http://www.intrinsic-id.com About INSIDE Secure INSIDE Secure (NYSE Euronext Paris FR0010291245 - INSD) provides comprehensive embedded security solutions. World-leading companies rely on INSIDE Secure's mobile security and secure transaction offerings to protect critical assets including connected devices, content, services, identity and transactions. Unmatched security expertise combined with a comprehensive range of IP, semiconductors, software and associated services gives INSIDE Secure customers a single source for advanced solutions and superior investment protection. For more information, visit http://www.insidesecure.com Juliette dos Santos juliette@ala.com ANDREW LLOYD & ASSOCIATES http://www.ala.com https://twitter.com/ALA_Group Tel France: +33 1 56 54 07 00 Tel UK: +44 1273 675100 Tel US: +1 617 517 0146 INTERNATIONAL TECHNOLOGY MARKETS, STRATEGY & COMMUNICATIONS ((M2 Communications disclaims all liability for information provided within M2 PressWIRE. Data supplied by named party/parties. Further information on M2 PressWIRE can be obtained at http://www.presswire.com on the world wide web. Inquiries to info@m2.com)).

(c) 2013 M2 COMMUNICATIONS

[ Back To SIP Trunking Home's Homepage ]

Loading
Subscribe here for your FREE
SIP TRUNKING enewslettter.

Featured Partner


Featured Whitepapers

SIP Security for the Enterprise
Voice over IP (VoIP) is incorporated into a variety of computer networks, both public and private, and used for everyday transactions and communications among carriers, businesses, government agencies...

Making A Broadband Purchase Decision
Businesses today have many options for broadband connectivity. Clarifying your particular business needs prior to selecting a broadband provider will ensure an optimal match of broadband service to your requirements.

Voice-Optimized Network Delivers Premier Call Experience
Customers equate call quality with business quality. Real-time communication, interpersonal interaction, and the cordial tone of a call center representative can create a positive impression of your business that no email can match.

Featured Case Studies

Business Telecom Expenses Reduced 50%
A small to medium sized company in the midwest was interested in migrating to IP Communications, but in today's economy, they were hesitant to upgrade their communication system due to their perception that the cost would outweigh the benefits.

Multi-State Company Cuts Telecom Costs 50%
A multi-site, multi-state company with extensive monthly long distance fees and toll-free charges did not have adequate broadband for Broadvox SIP Trunking requirements, nor did they have a SIP enabled telephone system.

Discover Leisure Connects Remote Users to its IP-PBX
Discover Leisure is one of the largest resellers of caravans and motor homes in the UK. With 15 branch of?ces all over the country, the company spent a great deal of money every month just on internal phone calls.

Featured eBOOKS

Internet+: The Way Toward Global Unified Communication
Connecting the telephony of the enterprise PBX or Unified Communications (UC) system using SIP trunks instead of conventional telephone lines has been very successful in recent years.

What is SIP Trunking? Edition 2
SIP trunking is becoming more of a focus for service providers. One key issue many service providers face when deploying SIP trunks is NAT, or Network Address Translation, traversal.

What is SIP Trunking? Edition 1
A vast resource for information about all things SIP - including SIP, security, VoIP, SIP trunking and Unified Communications.

Featured Videos

Broadvox VAR Testimonial VAR 1:
Part 1 of the VAR (Value Added Reseller) Partner Program Testimonials for Broadvox...

E-SBCs AS The Demarcation Point:
Ingate's Steve Johnson talks to Erik Linask about the role session border controller plays as the demarcation point at...

Demystifying DPI
How can deep packet inspection protect your SIP traffic as well as your entire network?

Featured Resources

Partner Program Overview:
Over 4,000 VARs, Master Agents, Solution Providers, and Independent IT Professionals trust Broadvox. We offer customized services and solutions to fit seamlessly into any company's business model. And when you partner with Broadvox, every member of our team stands behind you and your customers 100%...

SIP Trunk UC Summit

What's New

Presenting the New Ingate/Intertex Website:
Internet+ is an extended Internet access allowing high quality SIP (Session Initiation Protocol) based real-time person-to-person communication, everywhere and for any application. It applies to both fixed and mobile networks ...

Featured Blogs

Featured Webinars

Secure SIP Trunking:
What You Need to Know

Successfully Deploying Enterprise SIP Trunking:
Tools and Techniques for Overcoming Common Roadblocks

Featured Podcasts

Getting the Most Out of Your SIP Trunks:
Ingate's Steve Johnson and TMC's Erik Linask discuss how best practices forgetting the most out of SIP Trunking services and common pitfalls to avoid.

Featured Datasheets

Ingate SIParator E-SBCs
Adopting SIP is a simple process with the Ingate SIParator, the secure enterprise session border controller (E-SBC). The SIParator makes secure SIP communications - including VoIP,SIP trunking and more - possible while working seamlessly with your existing network firewall.

Ingate Firewalls
Everyone is talking about enterprise usage of VoIP, instant messaging and other types of realtime communications including presence and conferencing.

SIP Trunk Solutions for Service Providers
The award-winning Ingate Firewall and Ingate SIParator deliver a high quality, reliable SIP trunk connection between the customer's IP-PBX and the service provider network, and solve interoperability issues to simplify deployments and support for remote diagnosis of reported issues.