Skip to main content

World Card Summit: 'Significant opportunities and challenges,' says G&D

Speaking on cloud-based security and mobility at this year’s World Card Summit Axel Deininger, Giesecke & Devrient’s President and Head of Secure Devices Division, said that the already large number of ‘Card not Present’ transactions offer security solution providers significant opportunities and challenges. But, he added, solutions for data encryption can in many cases be derived from existing portfolios – the key is providing both access and secure end-to-end solutions.
November 20, 2013 Read time: 2 mins
Speaking on cloud-based security and mobility at this year’s World Card Summit Axel Deininger, Giesecke & Devrient’s President and Head of Secure Devices Division, said that the already large number of ‘Card not Present’ transactions offer security solution providers significant opportunities and challenges. But, he added, solutions for data encryption can in many cases be derived from existing portfolios – the key is providing both access and secure end-to-end solutions.

The enterprise security market is growing massively, noted Gemalto’s CEO Olivier Piou. Mobile phones and tablets are the principle drivers however the cloud creates particular challenges because of the proliferation of solutions. Multi-factor ID has progressed but needs to progress further, said Stephan Hofschen, CEO of Infineon Technologies’s Chip Card Division; some form of standardised access is needed and Piou noted that One-Time Password technology is relatively easy to deploy.

Steve Owen, SVP of Identification Sales at NXP Semiconductors, observed that on the consumer side organisations such as Google are pushing more security-related features. “But,” he added, “in the same way that many people only buy a burglar alarm once they’ve been burgled, we need to make people realise the security threat before something happens.”

Related Content

  • Navigating the data privacy landscape
    July 24, 2023
    If customer data is not protected then the journey towards better, less polluting public transport solutions is likely to be delayed, warns Alexis Suggett of Cubic Transportation Systems
  • GIS-based state of the art emergency response, damage recovery
    January 26, 2012
    The gecko is one of several members of the lizard family which demonstrate autotomy: the ability to re-grow a tail or some other appendage lost during a time of peril. The GITA's GECCo programme is looking to give US infrastructures much the same capability
  • Entrust Datacard merger helps secure digital future in IoT era
    November 5, 2014
    s smart devices and e-transactions proliferate in the Internet of Things (IoT) era, newly-merged business Entrust Datacard is uniquely placed to secure the connections between them, says its CEO Todd Wilkinson. The company, formed from Datacard Group and Entrust and formally united at CARTES SECURE CONNEXIONS this week, combines broad and deep expertise in hardware and software together with the know-how to combine them.
  • Tighten up on cyber security before hackers infiltrate ITS infrastructure
    October 19, 2015
    This year’s ITS World Congress in Bordeaux will have three sessions dedicated to cyber security and the issue will also be addressed under connected and automated vehicles categories. Jon Masters finds out why. American security researchers Charlie Miller and Chris Valasek attracted international press coverage recently when they demonstrated how they could hack into and take control of a vehicle from a remote laptop. While the implications are clearly serious for vehicle manufacturers, highway and transpor