Mobile Payment Technology Gotchas - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Mobile

Mobile Payment Technology Gotchas

Implementing mobile payment systems presents a high risk, high reward opportunity.

In 2011 mobile applications went mainstream, captivating consumers with fun games, useful utilities, and plenty of branding thrown in there for good measure. As businesses continue to pump out new applications to engage with customers, it is likely that developers will be asked to shift gears to reprioritize mobile apps as a marketing vehicle into something that drives top-line revenue into company coffers.

However, that kind of shift will require companies to dive headfirst into mobile payments, a prospect both thrilling and terrifying at once to savvy CIOs. Because though there is tremendous opportunity to grow the business through innovation with mobile payment and ordering systems, that opportunity brings a lot of risk.

An enterprise approach should follow a comprehensive and compartmentalized architectural approach based on the business needs, the opportunity, any risks, or disruptive elements of technology adoption, said Michael Iseyemi, global chief security officer for Aditya Birla Minacs. Specifically to mobile payment, the most important considerations in addition to the aforementioned items are security of the stored data, the security of the data transmission while it is in transit, and who the data is being transmitted to.

Organizations are finding it difficult to keep these principles in mind during the headlong rush into mobile payment system development, said Randall Rivera, senior enterprise architect for Excellis Interactive. His firm is currently working with a lot of Fortune 500 companies to help them securely build a mobile component into their business strategies. One of the first thing he advises them to do is take stock of what their current e-commerce systems already look like and try to leverage what security measures they already have in place.

At the end of the day, mobile is just another outlet and it should work under the same umbrella as other systems, he said. If you architect it properly, all of the systems go under the same service. If you've got the infrastructure to leverage, don't build it from scratch.

Read the rest of this article on Dark Reading.

How can companies find and fix vulnerabilities before they lead to a breach? Better yet, how can software developers identify flaws in their applications before the new software is ever deployed? In this report, Eliminating Vulnerabilities In Enterprise Software, Dark Reading offers a look at some tips and tricks for software development and vulnerability assessment. (Free registration required.)

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
MMAPLE000
50%
50%
MMAPLE000,
User Rank: Apprentice
1/27/2012 | 9:15:51 PM
re: Mobile Payment Technology Gotchas
Thank you for highlighting Randall in this article! It seems like developers are pushing out code as fast as they can, and security concerns can easily get lost. One of the ways that we help our clients with their mobile strategy is identifying ways to implement security without affecting timelines - to keep their operations secure. The business very likely isn't going to tolerate slowing the release rate to accommodate secure coding practices, so incorporating mobile security early is the key.
Commentary
2021 Outlook: Tackling Cloud Transformation Choices
Joao-Pierre S. Ruth, Senior Writer,  1/4/2021
News
Enterprise IT Leaders Face Two Paths to AI
Jessica Davis, Senior Editor, Enterprise Apps,  12/23/2020
Slideshows
10 IT Trends to Watch for in 2021
Cynthia Harvey, Freelance Journalist, InformationWeek,  12/22/2020
White Papers
Register for InformationWeek Newsletters
The State of Cloud Computing - Fall 2020
The State of Cloud Computing - Fall 2020
Download this report to compare how cloud usage and spending patterns have changed in 2020, and how respondents think they'll evolve over the next two years.
Video
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you.
Slideshows
Flash Poll