An email has been sent to . Please check your email and click the provided link to continue.
Waiting for email verification...
An email has been sent to . Please check your email and click the provided link to continue.
Verified! Thank you!
The report looks at the security of mobile devices from a hardware perspective. Trust hardware, secure boot, trusted execution environments are analyzed in terms of specifications, applicable standards, and target industries (such as financial services and government applications). The report looks at the current vendors competing to bring security to the core of mobile devices, whether through licensed silicon IP architecture design or firmware standards.