Enviar pesquisa
Carregar
Securing Mobile Payments: Applying Lessons Learned in the Real World
•
0 gostou
•
1,030 visualizações
CA Technologies
Seguir
Securing Mobile Payments: Applying Lessons Learned in the Real World
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 32
Baixar agora
Baixar para ler offline
Recomendados
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
CA Technologies
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
CA Technologies
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
CA Technologies
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices World
CA Technologies
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
CA Technologies
Introducing New Identity as a Service
Introducing New Identity as a Service
CA Technologies
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
CA Technologies
Critical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT Strategy
CA Technologies
Recomendados
Digital transformation in financial services through trusted digital relation...
Digital transformation in financial services through trusted digital relation...
CA Technologies
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
The answer is Forty2 - How analytics-backed bot mitigation helped Insilicum
CA Technologies
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
Pre-Con Ed: Build Your Own Apps for an Enhanced Network Management Experience...
CA Technologies
Strategies for DevOps in the API and Microservices World
Strategies for DevOps in the API and Microservices World
CA Technologies
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
Agile Operations Keynote: Redefine the Role of IT Operations With Digital Tra...
CA Technologies
Introducing New Identity as a Service
Introducing New Identity as a Service
CA Technologies
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
Pre-Con Ed: Monitor Your Cloud Infrastructure With CA Unified Infrastructure ...
CA Technologies
Critical Considerations for Mobile and IoT Strategy
Critical Considerations for Mobile and IoT Strategy
CA Technologies
Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: Learn What's New in CA Spectrum®
CA Technologies
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
CA Technologies
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
CA Technologies
Streamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite Deployment
CA Technologies
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
CA Technologies
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
CA Technologies
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next Level
CA Technologies
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
CA Technologies
CA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's New
CA Technologies
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
CA Technologies
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
CA Technologies
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
CA Technologies
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business Intelligence
CA Technologies
Introduction to Service Virtualization
Introduction to Service Virtualization
CA Technologies
Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?
CA Technologies
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
CA Technologies
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
CA Technologies
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
CA Technologies
Securely Enabling the Digital Age
Securely Enabling the Digital Age
CA Technologies
Tech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App Economy
CA Technologies
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
CA Technologies
Tech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpad
CA Technologies
Mais conteúdo relacionado
Mais procurados
Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: Learn What's New in CA Spectrum®
CA Technologies
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
CA Technologies
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
CA Technologies
Streamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite Deployment
CA Technologies
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
CA Technologies
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
CA Technologies
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next Level
CA Technologies
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
CA Technologies
CA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's New
CA Technologies
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
CA Technologies
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
CA Technologies
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
CA Technologies
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business Intelligence
CA Technologies
Introduction to Service Virtualization
Introduction to Service Virtualization
CA Technologies
Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?
CA Technologies
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
CA Technologies
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
CA Technologies
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
CA Technologies
Securely Enabling the Digital Age
Securely Enabling the Digital Age
CA Technologies
Tech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App Economy
CA Technologies
Mais procurados
(20)
Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: Learn What's New in CA Spectrum®
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Pre-Con Ed: CA Mobile App Services: Build the Powerful Mobile App Every Enter...
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
Pre-Con Ed: Learn What’s New in CA Unified Infrastructure Management 8.5
Streamlining Your CA Identity Suite Deployment
Streamlining Your CA Identity Suite Deployment
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Pre-Con Ed: Governance of Privileged Identities—Key to Breach Prevention
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
Tech Talk: Real-time Identity Analytics – Improving Performance through Incre...
API Risk: Taking Your API Security to the Next Level
API Risk: Taking Your API Security to the Next Level
Enabling a Hybrid Enterprise Application Launch Pad
Enabling a Hybrid Enterprise Application Launch Pad
CA Gen Updates: Application Modernization and What's New
CA Gen Updates: Application Modernization and What's New
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Case Study: Versent Helps Companies Get Started in the Application Economy Wi...
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: How to IAM-Enable Your Office 365 Environment
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
Pre-Con Ed: Leverage the Dynamic Service Modeling Functionality With CA Servi...
CA Project & Portfolio Management: Business Intelligence
CA Project & Portfolio Management: Business Intelligence
Introduction to Service Virtualization
Introduction to Service Virtualization
Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: What's New in Service Virtualization V10.0?
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
Pre-Con Ed: Discover the New CA App Experience Analytics 16.3 - The Omnichann...
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Pre-Con Ed (Lab): Making CA Identity Suite Deployment Incredibly Easy
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Tech Talk: Governing your Privileged Users – A Key Step Towards Reducing the ...
Securely Enabling the Digital Age
Securely Enabling the Digital Age
Tech Talk: CA Live API Creator: APIs and the App Economy
Tech Talk: CA Live API Creator: APIs and the App Economy
Destaque
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
CA Technologies
Tech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpad
CA Technologies
Convenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced Authentication
CA Technologies
Best Practices for Upgrading Your Mission-Critical CA SSO Environment
Best Practices for Upgrading Your Mission-Critical CA SSO Environment
CA Technologies
Application Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part I
CA Technologies
Modernizing the CA Datacom Data – SQL Access Part I
Modernizing the CA Datacom Data – SQL Access Part I
CA Technologies
Tools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC System
CA Technologies
Advanced DBA – Performance Tuning for MUF Part I
Advanced DBA – Performance Tuning for MUF Part I
CA Technologies
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
CA Technologies
CA IDMS Deadlock Analysis
CA IDMS Deadlock Analysis
CA Technologies
Reducing TCO with Datacom Compression (Presspack)
Reducing TCO with Datacom Compression (Presspack)
CA Technologies
Advanced DBA – Performance Tuning for MUF Part II
Advanced DBA – Performance Tuning for MUF Part II
CA Technologies
Modernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part II
CA Technologies
CA IDMS Buffer Tuning
CA IDMS Buffer Tuning
CA Technologies
Application Tuning for CA Datacom Environments Part II
Application Tuning for CA Datacom Environments Part II
CA Technologies
What’s new in CA Datacom
What’s new in CA Datacom
CA Technologies
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
CA Technologies
CA IDMS Performance and Tuning
CA IDMS Performance and Tuning
CA Technologies
system requirements for android projects
system requirements for android projects
parry prabhu
CA IDMS Database Navigation
CA IDMS Database Navigation
CA Technologies
Destaque
(20)
Identity and Access Management Survey: Current Market Challenges and Solutions
Identity and Access Management Survey: Current Market Challenges and Solutions
Tech Talk: Make life easy for your users with a hybrid application launchpad
Tech Talk: Make life easy for your users with a hybrid application launchpad
Convenience and Security for banking customers with CA Advanced Authentication
Convenience and Security for banking customers with CA Advanced Authentication
Best Practices for Upgrading Your Mission-Critical CA SSO Environment
Best Practices for Upgrading Your Mission-Critical CA SSO Environment
Application Tuning for CA Datacom Environments Part I
Application Tuning for CA Datacom Environments Part I
Modernizing the CA Datacom Data – SQL Access Part I
Modernizing the CA Datacom Data – SQL Access Part I
Tools for Monitoring and Tuning your CA IDMS/DC System
Tools for Monitoring and Tuning your CA IDMS/DC System
Advanced DBA – Performance Tuning for MUF Part I
Advanced DBA – Performance Tuning for MUF Part I
Introduction to Identity-as-a-Service and Secure Access to SaaS
Introduction to Identity-as-a-Service and Secure Access to SaaS
CA IDMS Deadlock Analysis
CA IDMS Deadlock Analysis
Reducing TCO with Datacom Compression (Presspack)
Reducing TCO with Datacom Compression (Presspack)
Advanced DBA – Performance Tuning for MUF Part II
Advanced DBA – Performance Tuning for MUF Part II
Modernizing the CA Datacom Data – SQL Access Part II
Modernizing the CA Datacom Data – SQL Access Part II
CA IDMS Buffer Tuning
CA IDMS Buffer Tuning
Application Tuning for CA Datacom Environments Part II
Application Tuning for CA Datacom Environments Part II
What’s new in CA Datacom
What’s new in CA Datacom
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
Pre-Con Ed: Monitor Your Storage Infrastructure With CA Unified Infrastructur...
CA IDMS Performance and Tuning
CA IDMS Performance and Tuning
system requirements for android projects
system requirements for android projects
CA IDMS Database Navigation
CA IDMS Database Navigation
Semelhante a Securing Mobile Payments: Applying Lessons Learned in the Real World
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
CA Technologies
Pre-Con Ed: The Role of SCM in Agile Development Methodology: CA Endevor Admi...
Pre-Con Ed: The Role of SCM in Agile Development Methodology: CA Endevor Admi...
CA Technologies
What's New in CA Agile Requirements Designer?
What's New in CA Agile Requirements Designer?
CA Technologies
Pre-Con Ed: CA Spool Analytics Deep Dive
Pre-Con Ed: CA Spool Analytics Deep Dive
CA Technologies
Pre-Con Education: Winning at Continuous Delivery with Service Virtualization
Pre-Con Education: Winning at Continuous Delivery with Service Virtualization
CA Technologies
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
CA Technologies
Auto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best Practices
CA Technologies
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
CA Technologies
From Fantasy to Reality: Mobile to Mainframe Infrastructure Visibility
From Fantasy to Reality: Mobile to Mainframe Infrastructure Visibility
CA Technologies
CA Project & Portfolio Management Resource Management Best Practices
CA Project & Portfolio Management Resource Management Best Practices
CA Technologies
Pre-Con Ed: So You Implemented a Service Bus? How Ya' Gonna Test That Monster?
Pre-Con Ed: So You Implemented a Service Bus? How Ya' Gonna Test That Monster?
CA Technologies
Pre-Con Ed: Interactive Session: Mainframe & DevOps in your Organization
Pre-Con Ed: Interactive Session: Mainframe & DevOps in your Organization
CA Technologies
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
CA Technologies
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
CA Technologies
Pre-Con Ed: Achieving Continuous Test & Delivery for Mainframe with CA Applic...
Pre-Con Ed: Achieving Continuous Test & Delivery for Mainframe with CA Applic...
CA Technologies
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New Features
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New Features
CA Technologies
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
CA Technologies
Pre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's Ahead
Pre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's Ahead
CA Technologies
Vision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
Vision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
CA Technologies
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek
CA Technologies
Semelhante a Securing Mobile Payments: Applying Lessons Learned in the Real World
(20)
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed (Lab): CA Identity Suite—Raising the Bar on User Productivity and ...
Pre-Con Ed: The Role of SCM in Agile Development Methodology: CA Endevor Admi...
Pre-Con Ed: The Role of SCM in Agile Development Methodology: CA Endevor Admi...
What's New in CA Agile Requirements Designer?
What's New in CA Agile Requirements Designer?
Pre-Con Ed: CA Spool Analytics Deep Dive
Pre-Con Ed: CA Spool Analytics Deep Dive
Pre-Con Education: Winning at Continuous Delivery with Service Virtualization
Pre-Con Education: Winning at Continuous Delivery with Service Virtualization
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
Pre-Con Ed: Real-Time Data Audit and Security: Find, Classify and Protect Sen...
Auto Integrate – DevTest Automation and Integration Best Practices
Auto Integrate – DevTest Automation and Integration Best Practices
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
Pre-Con Ed: CA Testing Tools Educational Session (Part 2 of 3): Learn, Engage...
From Fantasy to Reality: Mobile to Mainframe Infrastructure Visibility
From Fantasy to Reality: Mobile to Mainframe Infrastructure Visibility
CA Project & Portfolio Management Resource Management Best Practices
CA Project & Portfolio Management Resource Management Best Practices
Pre-Con Ed: So You Implemented a Service Bus? How Ya' Gonna Test That Monster?
Pre-Con Ed: So You Implemented a Service Bus? How Ya' Gonna Test That Monster?
Pre-Con Ed: Interactive Session: Mainframe & DevOps in your Organization
Pre-Con Ed: Interactive Session: Mainframe & DevOps in your Organization
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
Pre-Con Ed: Enterprise Wide Advanced Authentication: Introducing Advanced Aut...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: CA ACF2 and CA Top Secret – Part 1: What’s New in the Enterprise ...
Pre-Con Ed: Achieving Continuous Test & Delivery for Mainframe with CA Applic...
Pre-Con Ed: Achieving Continuous Test & Delivery for Mainframe with CA Applic...
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New Features
Pre-Con Ed: Migrate to CA Release Automation 6.x to Exploit New Features
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
Pre-Con Ed: New CA SYSVIEW Features to Quickly & Easily Create Reports
Pre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's Ahead
Pre-Con Ed: Learn, Engage and Grow with CA Endevor: What's New, What's Ahead
Vision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
Vision and Roadmap: CA Roadmap for the Continuous Delivery Portfolio
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek
Tech Talk: Mainframe Team Center—Event Management and Automation Sneak Peek
Mais de CA Technologies
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
CA Technologies
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
CA Technologies
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
CA Technologies
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
CA Technologies
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
CA Technologies
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
CA Technologies
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
CA Technologies
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
CA Technologies
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
CA Technologies
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
CA Technologies
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
CA Technologies
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
CA Technologies
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
CA Technologies
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
CA Technologies
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
CA Technologies
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
CA Technologies
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
CA Technologies
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
CA Technologies
Mais de CA Technologies
(20)
CA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
Último
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
marketing932765
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
panagenda
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
Pixlogix Infotech
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
IES VE
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
itnewsafrica
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
Wes McKinney
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Mark Goldstein
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
Bernd Ruecker
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
Ingrid Airi González
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Nikki Chapple
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
panagenda
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
fnnc6jmgwh
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
UiPathCommunity
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
TopCSSGallery
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
Kari Kakkonen
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Mark Simos
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
itnewsafrica
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
LoriGlavin3
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
BookNet Canada
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
Hiroshi SHIBATA
Último
(20)
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
Securing Mobile Payments: Applying Lessons Learned in the Real World
1.
World® ’16 Securing Mobile Payments: Applying Lessons Learned in the Real World James Rendell - VP Payment Security Strategy – CA Technologies SCX34S SECURITY
2.
2 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For Informational Purposes Only Terms of this Presentation © 2016 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The presentation provided at CA World 2016 is intended for information purposes only and does not form any type of warranty. Some of the specific slides with
customer references relate to customer's specific use and experience of CA products and solutions so actual results may vary. Certain information in this presentation may outline CA’s general product direction. This presentation shall not serve to (i) affect the rights and/or obligations of CA or its licensees under any existing or future license agreement or services agreement relating to any CA software product; or (ii) amend any product documentation or specifications for any CA software product. This presentation is based on current information and resource allocations as of November 1, 2016, and is subject to change or withdrawal by CA at any time without notice. The development, release and timing of any features or functionality described in this presentation remain at CA’s sole discretion. Notwithstanding anything in this presentation to the contrary, upon the general availability of any future CA product release referenced in this presentation, CA may make such release available to new licensees in the form of a regularly scheduled major product release. Such release may be made available to licensees of the product who are active subscribers to CA maintenance and support, on a when and if- available basis. The information in this presentation is not deemed to be incorporated into any contract.
3.
3 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2016 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2016 presentation is intended for informational purposes only and does not form any type of warranty.
The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
4.
4 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract Mobile is the new black—the way people work, shop and connect. Taking a cue from the payment point of view, this session will present best practices for securing mobile payments and how these practices are relevant across the enterprise. James Rendell CA Technologies VP Payment Security Strategy
5.
5 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda INTRODUCTION: SECURING MOBILE PAYMENTS MOBILE AUTHENTICATION SUMMARY RISK ANALYTICS REAL-TIME NETWORK NFC MOBILE WALLET PROVISIONING SECURING MOBILE IN-APP PURCHASES 1 2 3 4 5 6
6.
6 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Strategy for Secure Mobile Payments Secure Mobile Payment Mobile Authentication In-App purchase Mobile wallet Real-Time Risk Mobile Push Notification • Multi-factor authentication •
Push Notification and disconnected OTP options • Complies with emerging mandates, e.g. PSD2 MasterCard Identity Check • Biometric authentication options
7.
7 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Mobile Authentication: Mobile Push Notification § Mobile device as virtual identity §
Out-of-Band Authentication § Transaction inflight Push Notification on mobile § Fingerprint Authentication on Apple devices – Roadmap will incorporate Android etc. devices with similar capabilities
8.
8 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Deployment Options: Mobile OTP* § Passcode Generation on Mobile Device §
Offline OTP generation § Supports multiple cards on single App § Available in both OAuth and EMV modes *Planned Service Availability for Payment Security during 2017
9.
9 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Feature Highlights § Out-Of-Band Authentication for 3-D Secure 2.0 §
Easy-to-use Over-the-Air provisioning for cardholders § Based on Industry standard EMV Algorithm (CAP Certified and DPA Compliant) § Credentials are software locked to the provisioned device § Strong protection against SIM-Swap § Cryptographic Camouflage technology prevents brute force attack § Fine-Grained Authentication Controls using CA Risk Analytics § Suitable for Enterprise and Consumer digital channels
10.
10 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Multiple Provisioning Options § During 3-D Secure Transaction Flow §
Via Online Banking Channel – Online Banking provides an option to enroll in Mobile Authentication by integrating with our exposed Web Service § Via Issuer Mobile App – Using an “Add Account” option from within the Issuer Mobile App § Via APIs for enterprise system integration
11.
11 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Business function Channels Online servicing CA-Strong Authentication Payments (3-D Secure) Enterprise application Risk evaluation and scoring • Rules •
Machine learning • Statistical • Behavioral 3-D Secure Biometric Device ID Case Management / Reporting Wearables MFA Mobile browser Notification CNP Traditional browser In-store tablet Telephone / IVR OmniChannel Enabler: Enterprise and Consumer Apple Pay Android Pay Google Wallet
12.
12 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Strategy for Secure Mobile Payments Secure Mobile Payment Mobile Authentication In-App purchase Mobile wallet Real-Time Risk Risk Analytics Real-Time Network • Device Identity is a key fraud indicator •
Leverage global device identity / reputation • Real-Time model updates
13.
13 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Risk Analytics Real-Time Network 1. Predictive model learns bank-specific cardholder behavior and fraud patterns. 2.
Devices may be used across banks, hence complementary Device Distillates are incorporated in the Risk Analytics Network model. 3. Device Distillates updated in real-time as transactions are processed. 4. Score will be higher when devices previously associated with probable fraud are used. Bank 1 Bank 2 Bank 3 Real-time update
14.
14 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Risk Analytics Real-Time Network Explained Fraud Not Detected by Current Risk Analytics Model Time Card Pivot CARD1 BSYKB, 12.5 GBP DEVICE1 20130411:14:48:03 20130502:12:01:45 20130527:19:09:36 5 3 8 8 51 0 20130508:10:03:12 40 5 GOAL 8.0 GBP DEVICE2 RA Model Score HUNGRYHOUSE 20.7 GBP DEVICE1 TRADE MEDIA 47.38 GBP DEVICE3 Non Fraud Fraud • There are 4 transactions on CARD1, two legit and two fraud •
Current Risk Analytics Model scoring not high enough to detect two fraudulent transactions • Lacking visibility into historical transactions across a given device Date/Time of Transaction Merchant Name Transaction Value Device ID Risk scores not high enough (<600) to be deemed fraud.
15.
15 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Risk Analytics Real-Time Network Explained Improved Fraud Detection by Risk Analytics Network Model Non Fraud Fraud Time Card Pivot CARD1 BSYKB, 12.5 GBP DEVICE1 20130411:14:48:03 20130502:12:01:45 20130527:19:09:36 20130508:10:03:12 GOAL 8.0 GBP DEVICE2 HUNGRYHOUSE 20.7 GBP DEVICE1 TRADE MEDIA 47.38 GBP DEVICE3 6 2 11 4 RA Network Model Score 99 2 Device Pivot DEVICE2 20130508:09:49:36 GOAL 8.0 GBP CARD3 610 20130508:09:48:16 GOAL 8.0 GBP CARD2 237 20130508:09:56:39 GOAL 8.0 GBP CARD4 997 20130508:10:37:43 GOAL 8.0 GBP CARD5 976 20130508:10:49:01 GOAL 8.0 GBP CARD6 994 96 0 Device Pivot DEVICE3 TRADE MEDIA 47.38 GBP CARD5 20130527:15:57:24 142 TRADE MEDIA 47.38 GBP CARD7 20130527:16:46:40 801 TRADE MEDIA 47.38 GBP CARD8 20130527:19:06:05 942 TRADE MEDIA 47.38 GBP CARD4 20130527:19:24:13 978 • New device pivots (i.e. DEVICE2 and DEVICE3) are included in Risk Analytics Network model. •
Allows us to also consider the historical transactions by device in evaluation scoring. • Result is that the new model scores high on the two fraudulent transactions on CARD1; stopping the fraud.
16.
16 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Strategy for Secure Mobile Payments Secure Mobile Payment Mobile Authentication In-App purchase Mobile wallet Real-Time Risk NFC Mobile Wallet Provisioning • Cardholder authentication when provisioning card data to mobile device •
Accelerate time-to-market for issuers wanting to embrace “*Pay” programs.
17.
17 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What Is Mobile Payment Enablement Adding a customer’s payment method to a mobile platform or wallet
18.
18 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Wallets Are Not New… They Are Not Mature Either Financial Services PayPal Venmo Chase CurrentC Square Retail Merchants Starbucks Amazon Walmart Wholefoods Traditional Payments MasterCard Visa Amex VeriFone Device Makers Google Apple Samsung Existing Wallet Market… Everyone Wants to Capture the Loyalty
19.
19 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Mobile Wallets: Apple Pay Provisioning Security § Early NFC Mobile wallet deployments had provisioning weaknesses §
Stolen card data could be provisioned to NFC Mobile devices – Coupled with contactless Point of Sale, effectively cloning EMV cards!! § CA developed an incubator offering to do OTP cardholder authentication during NFC Mobile Wallet provisioning, increasing the assurance that card data is being provisioned to the cardholder’s phone and not a fraudster’s § Accelerated Time-to-Market for “*Pay” NFC Mobile implementations Onboarding Provisioning Transaction Support
20.
20 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Provisioning Flow Enroll Eligible? Authenticate
OTP Activation Wallet provider Card Scheme CA on Issuer’s behalf Return Activation data OTP Delivery OTP Validation / authentication Token Confirmation American Express Apple Pay Android Pay Google Wallet Samsung Pay Android Pay MasterCard Visa
21.
21 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD CA Strategy for Secure Mobile Payments Secure Mobile Payment Mobile Authentication In-App purchase Mobile wallet Real-Time Risk In-app purchase • 3-D Secure 2.0 native support for in-app purchase •
Rich data evaluation, fraud risk scoring, and mobile authentication challenge.
22.
22 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Evolution of 3-D Secure Building Trust Goals Actions Results Build confidence in e-commerce Reduce fraud displaced by EMV implementation Improve customer Experience. Reduce abandonments. Better authorization rates. Access to more channels. Liability shift for participating merchants Simplify enrolment to drive adoption. Strengthen authentication options First steps in application of analytics and predictive modelling 3-D Secure 2.0. Sophisticated Data Science. Authorization Integration. Fragmentation and scheme-by- scheme service introduction Adoption rates increase worldwide More effective fraud reduction Increase authorization rates and lending. Access to more transactions. Reduce Fraud. Optimized user experience. Fighting Fraud Minimizing Friction “Smart Authorization” 2001 2006 2010 2016 2018 Insight and Personalization Reach new markets and customer segments by leveraging rich data. Analytics. Data Feeds to marketing, personalization, and CRM systems. Grow customer base. Develop high value partnerships and relationships. Reinforce brand strength.
23.
23 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Problems With 3-D Secure 1.0.2 § 3-D Secure 1.0.2 was designed for the PC-based online shopping world §
User experience on mobile browsers is often poor § Merchants wary of invoking 3-D Secure with mobile transactions § No support for in-app purchase Material derived by reference to public domain information. See: https://www.emvco.com/about_emvco.aspx?id=306 http://www.emvco.com/faq.aspx?id=305
24.
24 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD 3-D Secure 2.0 § Developed and owned by EMVCo –
Manages and controls the EMV standards § Designed for in-app purchase – Native app and HTML UI support – Flexible authentication options § Browser specification replacement for 1.0.2 § Designed to optimize user experience – By passing detailed data from the mobile device only a small percentage of transactions would need to be challenged – => The leaders in this new world will be those who can leverage world-class Data Science Material derived by reference to public domain information. See: https://www.emvco.com/about_emvco.aspx?id=306 http://www.emvco.com/faq.aspx?id=305
25.
25 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What’s New in 3-D Secure 2.0? § Rich data §
Early risk evaluation § Frictionless, Challenge, and Out of Band Authentication Flows § In-app purchase integration § New browser specification § ID&V Flows Material derived by reference to public domain information. See: https://www.emvco.com/about_emvco.aspx?id=306 http://www.emvco.com/faq.aspx?id=305
26.
26 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Early Rich Data § Enhanced data passed up-front in the equivalent of the VEReq message –
Device ID / fingerprint – Merchant Category Code – Purchase amount, currency – Optional cardholder billing / delivery details § Enhanced fraud detection § Optimize user experience – Majority of transactions will never be challenged Material derived by reference to public domain information. See: https://www.emvco.com/about_emvco.aspx?id=306 http://www.emvco.com/faq.aspx?id=305
27.
27 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Tying It All Together
28.
28 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Summary: CA Strategy for Securing Mobile Payments ••Native mobile user experience ••Rich data evaluation ••Provisioning security ••Cardholder authentication ••Mobile Strong Authentication ••Omni Channel enablement ••Neural Networks ••Device Identity Transaction Risk Authentication Mobile appsMobile Wallets Neural Networks
29.
29 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Don’t Miss Our INTERACTIVE Security Demo Experience! SNEAK PEEK! 29 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
30.
30 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Questions?
31.
31 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Thank you. Stay connected at communities.ca.com
32.
32 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Security For more information on Security, please visit: http://cainc.to/EtfYyw
Baixar agora