#Privacy: Just one third of global smartphones sold last year had embedded hardware cybersecurity

Sales of smartphones with embedded hardware security (secure smartphones) grew 39% year-on-year in 2019, according to the latest research from Counterpoint’s IoT Security Service.

Commenting on the importance of smartphone security, Counterpoint Research Analyst, Satyajit Sinha, noted:

“Smartphone users are increasingly storing personal and professional data including digital banking, payment and financial information on smartphones. This attracts cyberattacks with victims losing real assets, such as money, personal data and loss of privacy. Securing smartphones should be a high priority for the smartphone industry.”

Mr. Sinha added:

“Traditionally, mobile security was mostly about software applications, however, with the increased threats, there is a need to secure hardware at one end and data at the other. There is a rising need for end-to-end security. Secure chipsets like eSE, PUFs, and TPMs embedded in the smartphone are currently the best solution to meet increased security needs.”

Commenting on the competitive landscape in the secure chipset market, Counterpoint Research Vice President, Research, Neil Shah, noted:

“The eSE is a coprocessor within the SoC which assures tamper-resistance and is capable of securely hosting applications. From the iPhone 5s onwards, Apple has been embedding a secure enclave (eSE) provided by the Global Platform. The communication within the eSE and application processor is isolated, which secures data from malware attacks. Huawei also implemented an inSE on its SoCs, the HiSilicon Kirin 960, 970, 980, 990 and 710.”


PrivSec Conferences will bring together leading speakers and experts from privacy and security to deliver compelling content via solo presentations, panel discussions, debates, roundtables and workshops.

For more information on upcoming events, visit the website.

We have been awarded the number 1 GDPR Blog in 2019 by Feedspot.

Privacy Culture: Data Privacy and Information Security Consulting, Culture & Behaviour, Training, and GDPR maturity, covered. https://www.privacyculture.com/