Skip to main content

World Card Summit: 'Significant opportunities and challenges,' says G&D

Speaking on cloud-based security and mobility at this year’s World Card Summit Axel Deininger, Giesecke & Devrient’s President and Head of Secure Devices Division, said that the already large number of ‘Card not Present’ transactions offer security solution providers significant opportunities and challenges. But, he added, solutions for data encryption can in many cases be derived from existing portfolios – the key is providing both access and secure end-to-end solutions.
November 20, 2013 Read time: 2 mins
Speaking on cloud-based security and mobility at this year’s World Card Summit Axel Deininger, Giesecke & Devrient’s President and Head of Secure Devices Division, said that the already large number of ‘Card not Present’ transactions offer security solution providers significant opportunities and challenges. But, he added, solutions for data encryption can in many cases be derived from existing portfolios – the key is providing both access and secure end-to-end solutions.

The enterprise security market is growing massively, noted Gemalto’s CEO Olivier Piou. Mobile phones and tablets are the principle drivers however the cloud creates particular challenges because of the proliferation of solutions. Multi-factor ID has progressed but needs to progress further, said Stephan Hofschen, CEO of Infineon Technologies’s Chip Card Division; some form of standardised access is needed and Piou noted that One-Time Password technology is relatively easy to deploy.

Steve Owen, SVP of Identification Sales at NXP Semiconductors, observed that on the consumer side organisations such as Google are pushing more security-related features. “But,” he added, “in the same way that many people only buy a burglar alarm once they’ve been burgled, we need to make people realise the security threat before something happens.”

Related Content

  • change in the US transportation sector
    February 6, 2012
    Transportation for America's James Corless talks about the changes needed in the US's transportation policy. Anew report, 'Smart Mobility for a 21st Century America', highlights how improving efficiency through technology is critical as the US's population grows and ages, budgets tighten and consumer preferences shift.
  • America fires V2V starting gun
    April 7, 2014
    Leo McCloskey, ITS America’s senior vice president for Technical Programs, talks to Jason Barnes about what the recent NHTSA ruling on light vehicle connectivity means for cooperative infrastructures in North America. In early February the US Department of Transportation’s (USDOT’s) National Highway Traffic Safety Administration (NHTSA) announced it had decided to start taking steps to enable Vehicle-to-Vehicle (V2V) communication technology for light vehicles. In so doing, the many safety-related applicati
  • Teledyne to acquire Flir for $8bn
    January 6, 2021
    The two companies' various camera and sensor products have 'minimal overlap', they insist
  • Technologies to protect connected cars ‘not being utilised’
    August 10, 2016
    A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’. The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbe