More secure web commerce

appMobi (www.appmobi.com) today unveiled its secure cloudKey™ authentication technology.
Author:
Publish date:
Social count:
0

appMobi (www.appmobi.com) today unveiled its secure cloudKey™ authentication technology, and announced cloudKey's immediate integration into appMobi's 1Touch "single touch" payment system. 1Touch with cloudKey is ready for use by Web and mobile app developers who seek to offer their users a highly secure and streamlined e-commerce experience. A 1Touch demonstration is available at http://www.appmobi.com/1Touch.

The user’s credit card information is stored, encrypted, only on the user's device, never in an online database. Using a “distributed key” topology, cloudKey stores in the cloud only the decryption keys – information that is valueless without the user’s device and password.

Featured

Related

Web security merger

  M86 Security, provider of Web and messaging security products, today announced the acquisition of Finjan, provider of secure Web gateway solutions for the enterprise market.

SECURITY: Step by Step

It's time to begin planning for summer upgrades, and if information security isn't at the top of your list, it should be. Your students continue to learn more about the tools and technology that could be used to circumvent your current security infrastructure. What you need is a security architecture and approach that

Expiring Security

Listen to the podcast Question: Sometimes when I got to visit a website, it tells me that the "security certificate" is expired. What does this mean, and should I be concerned? The IT Guy says: One way of protecting Internet users from fraudulent websites is the use of "security certificates." This is

Secure Web Gateway

USG 3.0 provides granular control of not only Web sites and applications but also the content posted to blogs, wikis, webmail and social networking sites such as Twitter, Facebook and YouTube. 

Security in a Box

These days, security has become a loaded word. Security has increased just about everywhere—on subways and buses, in airports, and at courthouses. Security is critical on information networks, too. As many school IT specialists have learned the hard way, hackers, viruses, spam, and spyware lurk behind every

Image placeholder title

BYOD and Security

Last month we wrote about the evolution of one-to-one computing and how districts are allowing students to “bring your own device” (BYOD) to school.