ARM launches smartphone security joint venture

Trustonic to bolster phones and tablets against malware and hacking

Mobile wallet

ARM has launched a new joint venture that aims to secure smartphones and tablets against virus and other malicious software.

Dubbed Trustonic, the joint venture with Dutch security software makers Gemalto and German company Giesecke & Devrient, is proposing a secure extension separate from the operating system that manufacturers can build into smart devices.

This collaboration will enable us to trust our smart connected devices to protect us as they deliver essential service.

Under the terms of the deal, ARM owns 40 per cent of the joint venture, with the other two holding 30 per cent each. The alliance will run for eight years initially.

The technology is based on ARM's Trustzone technology, with Gemalto and Giesecke & Devrient providing the security and management software.

The technology, it is hoped, will secure e-commerce transactions on smartphones as people use desktops and laptops less in favour of handheld devices.

Trustonic has signed up partners including 20th Century Fox Home Entertainment, Cisco, Discretix, Good Technology, INSIDE Secure, Irdeto, MasterCard, Nvidia, Samsung Electronics, Sprint, Symantec, and Wave Systems.

The company will be led by the former general manager of ARM's secure services division Ben Cade and CTO Jon Geater, as well as COO Chris Jones, the former vice president of licensing for ARM's processor division.

The firm will be headquartered in Cambridge (UK), with offices across Asia, Europe and North America.

"Trustonic builds upon decades of experience between ARM, Gemalto and G&D in developing secure technology for connected devices," said Cade.

"The launch of Trustonic marks a turning point in our connected world. It will enable us to trust our smart connected devices to protect us as they deliver essential services and innovative user experiences."

The company will focus on the development of a GlobalPlatform compliant Trusted Execution Environment (TEE), which will offer a common security standards for connected devices.

Featured Resources

Defeating ransomware with unified security from WatchGuard

How SMBs can defend against the onslaught of ransomware attacks

Free download

The IT expert’s guide to AI and content management

How artificial intelligence and machine learning could be critical to your business

Free download

The path to CX excellence

Four stages to thrive in the experience economy

Free download

Becoming an experience-based business

Your blueprint for a strong digital foundation

Free download

Recommended

AMD Zen+, Zen 2 vulnerable to Meltdown-style attacks
data processing

AMD Zen+, Zen 2 vulnerable to Meltdown-style attacks

31 Aug 2021
What is a GPU?
Hardware

What is a GPU?

16 Jul 2021
AMD will power Tesla’s upcoming in-car gaming console
Hardware

AMD will power Tesla’s upcoming in-car gaming console

1 Jun 2021
Nigerian cyber criminals target Texas unemployment system
cyber security

Nigerian cyber criminals target Texas unemployment system

27 May 2021

Most Popular

What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

8 Sep 2021
BT conducts 'world's first' trial of quantum-secure communications
Network & Internet

BT conducts 'world's first' trial of quantum-secure communications

13 Sep 2021
Google takes down map showing homes of 111,000 Guntrader customers
data breaches

Google takes down map showing homes of 111,000 Guntrader customers

2 Sep 2021