INSIDE's secure microcontroller has achieved Common Criteria EAL 5+ certification
INSIDE's secure microcontroller provides a highly flexible and cost-effective solution

INSIDE Secure, a leader in embedded security solutions for mobile and connected devices, recently announced that it has started delivering its latest generation secure microcontroller for the Carte SESAM-Vitale 2 program, the French national health care insurance card.

“Since the introduction of the first Carte SESAM-Vitale program, our secure microcontrollers have been used and we have delivered more than 40 million units to date,” said Bernard Vian, executive vice-president of the Secure Transactions division at INSIDE Secure. “The delivery of the latest generation of our secure microcontroller for this program confirms our continuing leadership position in the security market.”

INSIDE's secure microcontroller has achieved Common Criteria EAL 5+ certification. This low-power high-performance 8/16-bit microcontroller is based on Harvard RISC architecture. It provides a highly flexible and cost-effective solution for many applications requiring high level of security.

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...