Trusted Execution Environment in Access Control
An unfortunate consequence of a well-connected world is that the cost of cybercrime has gone up – a lot. Poorly protected IoT devices can be a particular problem, providing new, easy ways for hackers to steal information or gain access to valuable data, networks or physical assets.
The need has never been greater for trusted identification of connected devices. Enter Trusted Execution Environment.
In this white paper, Johnson Controls access brand Tyco Software House explains what a Trusted Execution Environment is and how it guarantees confidentiality and integrity of code and data for access control, ultimately keeping hackers from stealing sensitive information.
- The cost of cybercrime is on the rise.
- What is a Trusted Execution Environment?
- TEE should be expected in physical access control solutions.
- iSTAR Edge G2: first cyber-hardened IP edge access control device to utilize TEE.