Top 4 New Network technologies in 2012

Regional and international experts discuss new network technologies, such as governance, risk and compliance and mobile application management, and what they mean for enterprises

Tags: Dell CorporationEMC CorporationGartner IncorporationSonicWALL IncorporatedSony Corporation
  • E-Mail
Top 4 New Network technologies in 2012 Firewalls are a key defence mechanism in cloud security, according to Dell SonicWALL.
By  Georgina Enzer Published  November 11, 2012

NFC makes life easier to get information, easier to pay for goods and services, use in public transport, and share data between devices. This works by just bringing NFC-compatible devices close to one another. NFC is currently also used for health care, information exchange, loyalty and coupons.

“The benefits of NFC technology are so attractive that many industries are use NFC technology to enhance their services and customer experience. NFC-enabled services are fast and easy to use without compromising existing service security,” explains Niranj Sangal, group CEO at Card Personalization, Payment issuance and payment acquiring systems experts, OMA Emirates.

Spyridon Gousetis director of marketing MEA, Sony says that NFC can also be used for fleet and package tracking and that enterprise uses of the technology are endless.

“A simple example where NFC has been applied commercially is at Singapore Airport, where all luggage items are tracked with the help of small NFC tags that are placed on all luggage. Effectively the airport has been able to reduce delays and transit times that are related to luggage tracking thanks to NFC,” he says.

NFC for payments

Using NFC for mobile payments via is as secure as payment done today with an EMV plastic chip card, according to Sangal. NFC mobile payment uses the physical and logical security mechanisms which are used for contactless cards and also brings an additional security layer to comply with the need for post-issuance activation of an NFC payment application. This requires certification from the bank or credit card provider.

These payment applications are downloaded and installed in a secure element such as SIM cards or Micro SD cards which have common criteria certified by payment network schemes. The post-issuance process includes initialisation of the security mechanisms of a payment application via TSM (Trusted Service Managers) in a standardised NFC secure element. Finally the trusted service managers (TSMs) in charge of managing the payment applications remotely are hosted in secure sites certified by financial service bodies.

“Consumers need to enter a PIN for all payment transactions; even for small amounts. This provides the end-user with complete protection. Secure over-the-air technology for remote management enables immediate remote blocking of the payment application. This works in a same way as blocking a bank card,” says Sangal.

Gemalto, which provides a Trusted Services Platform alongside its NFC Up Teq SIM cards, says security is crucial when you start to go global and start to be exposed to fraud. Because NFC technology is used for payment applications, security is a central element and the company provides mobile operators with the highest level of security solutions on their solutions, which have been certified Visa and Mastercard. Moreover, in the event the phone would be lost or stolen, secure over-the-air (OTA) technology for remote management enables immediate remote blocking of the payment application when the client requests it, just as if you were blocking your banking card.

Adoption of NFC

NFC is already seeing a surge in popularity in the region, with various NFC related pilot projects already underway. According to Gousetis it is just matter of time before we see widespread deployment of NFC mobile payments/transactions.

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code