ENHANCING HCE MOBILE PAYMENTS WITH TEEs

January 1, 2019

This white paper explains the use of Trusted Execution Environments (TEEs) in the context of HCE mobile payments and explores why companies deploying HCE mobile payment solutions should consider using TEEs to enable a higher level of security and to minimize the possibility of attacks. Dejamobile, in collaboration with Cartes Bancaires and Trustonic, is currently working on an innovative Generic Secure Trusted Application, leveraging the capabilities of the TEE with the aim of strengthening the security of HCE mobile payments. An industry first initiative in the cybersecurity market.

Spotlight

Marlabs Inc.

Marlabs helps drive digital agility for our clients. We deliver innovative business solutions using digital technologies such as cloud, mobile, analytics, Internet of Things, and social. With a dedicated team of over 2,100 associates, a network of delivery centers in USA, Canada, Mexico, and India, and strong partnerships with industry leaders, Marlabs offers a wide range of IT services across industries. Through our emphasis on quality driven by CMMi, PCMM, ISO 9001-2000, ISO 27001, and SSAE 16 Type II best practices and a customer- centric client engagement model, Marlabs has achieved a dependable track record of meeting high standards of excellence in every customer engagement.

OTHER WHITEPAPERS
news image

Zero Trust: Your Digital Transformation Requires a Risk Transformation

whitePaper | September 28, 2022

Modernizing your technology landscape requires a parallel cybersecurity strategy because your users and data are no longer protected by the corporate firewall. While the cloud provides unsurpassed agility, it also exposes new threat vectors. Your digital transformation must be accompanied by an innovative and comprehensive approach to reduce risk and attack surfaces.

Read More
news image

Project Blackfin: Automated Breach Detection Using Intelligent Agents

whitePaper | December 4, 2019

This paper describes a distributed anomaly detection approach designed to accurately track actions performed by adversaries across a network. The illustrated approach involves running multiple machine learning models on both endpoints and the network as well as on a centralized backend, and includes communication and replication of learned states between these models.

Read More
news image

Google Cloud security foundations guide

whitePaper | April 19, 2021

This guide presents an opinionated view of Google Cloud security best practices, organized to allow users to adopt or adapt them and then automatically deploy them for their estates on Google Cloud. This document can be useful to you if you are a CISO, security practitioner, risk or compliance officer.

Read More
news image

Protecting Against Sophisticated Bot Attacks

whitePaper | November 18, 2022

Bot-generated attacks have risen in visibility, and defending against these attacks is now a priority for most organizations. Yet challenges persist in accurately identifying bot traffic; protecting a distributed, heterogeneous application environment from these attacks; and minimizing the impact to legitimate users while doing so. To address these issues, intelligent protection against sophisticated bots is a necessity. This should include strong analytics coupled with human expertise, a frictionless user experience, and consistent coverage across different architectures and platforms. F5 Distributed Cloud Bot Defense, built on Google Cloud, supports these requirements and can help prevent fraud and abuse against public-facing web applications.

Read More
news image

Best Practices for Row Level Security with Entitlements Tables

whitePaper | September 16, 2022

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More
news image

Simplify Data Protection for VMware Workloads with Veeam Data Platform

whitePaper | March 1, 2023

Outages and data loss are an unfortunate reality for businesses today. These outages can cause big risks to your company’s reputation and revenue, as every minute of downtime means that critical data isn’t accessible to your business. If things weren’t complicated enough, managing a complex, hybrid, multi-cloud environment makes continuity even harder. These challenges increase complexity exponentially, greatly impacting your ability to stay in control.

Read More

Spotlight

Marlabs Inc.

Marlabs helps drive digital agility for our clients. We deliver innovative business solutions using digital technologies such as cloud, mobile, analytics, Internet of Things, and social. With a dedicated team of over 2,100 associates, a network of delivery centers in USA, Canada, Mexico, and India, and strong partnerships with industry leaders, Marlabs offers a wide range of IT services across industries. Through our emphasis on quality driven by CMMi, PCMM, ISO 9001-2000, ISO 27001, and SSAE 16 Type II best practices and a customer- centric client engagement model, Marlabs has achieved a dependable track record of meeting high standards of excellence in every customer engagement.

Events