Made With Uberflip Content Marketing

Payments & Banking

  • White paper: A fundamental shift in financial services

    White paper: A fundamental shift in financial services

    Financial services players - incumbents and new entrants alike - need to consider new developments in cryptography that will reshape the way they implement security.

    Read Flipbook
  • Surviving disruption: the right security will help you thrive

    Surviving disruption: the right security will help you thrive

    The impact of global cybercrime is shocking: 38.5% of firms have experienced a cyberattack in the past 12 months and 21% of cyberattacks result in costs exceeding €5M. Financial services is...

    Read Article
  • 2017 – A year of disruption in Payments & Banking

    2017 – A year of disruption in Payments & Banking

    It’s 2017 and, ready or not, the payments & banking industry is facing disruption. But what does that mean for your company’s cyber security? We hope to unravel that for you in the Irdeto payments...

    Read Article
  • E-book: The biggest cyber threat you've never heard of

    E-book: The biggest cyber threat you've never heard of

    Increased use of 3rd party APIs will open innovative new services and apps for consumers to access financial info over the internet but hackers can more easily perpetrate man-in-the-middle attacks

    Read Flipbook
  • Datasheet: API Protection for banks

    Datasheet: API Protection for banks

    Every time a consumer uses a payment form, this client-to-server connection becomes open to what we call an MitM (man-in-the-middle) attack. API Protection uses a combination of the following security

    Read Flipbook
  • Datasheet: API Protection for PSPs

    Datasheet: API Protection for PSPs

    . Every time a consumer uses a payment form, this client-to-server connection becomes open to what we call an MitM (man-in-the-middle) attack. API Protection uses a combination of the following securi

    Read Flipbook
  • Seeing cybercrime as a business helps to fuel new combat strategies

    Seeing cybercrime as a business helps to fuel new combat strategies

    Picture Bob. He thinks he’s figured out how to avoid paying for cable TV by watching programs streamed from pirate websites. One day, he’s watching a live football broadcast and ten minutes into...

    Read Article
  • How banks and PSPs can break free from fraud threats

    How banks and PSPs can break free from fraud threats

    Stealing millions of dollars in an elaborate bank heist makes for a great Hollywood movie – just throw in the hottest Hollywood stars, exotic locations, flashy cars, a computer whiz and obscure...

    Read Article
  • Will PSD2 technical guidance affect the consumer experience?

    Will PSD2 technical guidance affect the consumer experience?

    A lot has been written about PSD2 and its impact. The hope is it will allow 3rd parties (Account Information Service and Payment Initiation Service Providers) to access consumers’ transactional...

    Read Article
  • White paper (full version): The case for connected application-centric software security

    White paper (full version): The case for connected application-centric software security

    Software protection technologies aid with the protection scheme: whitebox cryptography, code transformations for anti-reversing and anti-hacking, anchoring to a trusted source, monitoring/diversity.

    Read Flipbook
  • Datasheet: Irdeto Secure UI - Anti-keylogging/screen scraping

    Datasheet: Irdeto Secure UI - Anti-keylogging/screen scraping

    Irdeto has developed a unique and innovative solution to prevent successful key-logging and screen scraping.

    Read Flipbook
  • Solution overview: Irdeto MPOS Security

    Solution overview: Irdeto MPOS Security

    mPOS Security hardens the mPOS app to protect device and network connections against any unauthorized attempts to access APIs; creates a trusted block of code that is hardened and integrated into app.

    Read Flipbook
  • Solution overview: Cloaked.JS Security Target

    Solution overview: Cloaked.JS Security Target

    Cloaked.JS is an evolution of Irdeto’s code obscuring and white-box cryptography product line into the JavaScript/Browser environment.

    Read Flipbook
  • loading
    Loading More...