Overview

Mobile computing is becoming pervasive: Handheld devices are slowly, but surely becoming our personal must-haves beyond anything we have seen before. As mobile hand-sets have taken over how we write email and access the web, they are increasingly becoming tools of authentication as well our virtual wallets, containing anything from credit cards to personal information on largely insecure, mobile and always connected handheld devices.

As a company that prides itself with usability in security, it is a wonderful challenge to be part of delivering the future in mobile security.

Within the mobile security space, Cryptomathic provides:

  • Host Card Emulation app security

  • 2-Factor authentication apps

  • NFC / contactless Payment Scheme security

  • Mobile payments issuance

  • Mobile wallets and TSM (Trusted Security Module)

  • Key Management

  • Mobile App Security Core - Software security platform for payment apps

White Papers:

In this space, Cryptomathic serves the World's largest payment schemes, the largest financial services providers and the largest eID / eBank / eGov holistic schemes provided to date.

Product Groups

Cryptomathic products used in the mobile security sector are centered around three groups:

Read more

Authentication & Signing

Read more

EMV

Read more

Key Management

Testimonials


White Papers

Access free resources

At the leading edge of security provision within its key markets, Cryptomathic closely supports its global customer base with many multinationals as longstanding clients.

  • WHITE PAPER

    EMV Key Management - explained

    Lack of overview or trouble
    understanding EMV key management?
    EMV as seen from a crypto angle for all involved parties in acquiring and issuing.

    READ WHITE PAPER
  • WHITE PAPER

    eIDAS Compliant Remote eSigning

    What is the most secure and user-friendly digital signing experience? Explore the key business advantages and the security requirements for remote e-signatures in accordance with eIDAS.

    READ WHITE PAPER
  • WHITE PAPER

    Key Management Compliance - explained

    Need to explore the complex world of crypto key management? Understand major aspects, including regulatory authorities, compliance schemes, audits, best practices and more.

    READ WHITE PAPER
  • WHITE PAPER

    Cloud Signing vs
    Smart Card Signing

    Which digital signature technology is most applicable for large organisations? Compare the security, usability and costs of different signature generation technologies.

    READ WHITE PAPER
  • WHITE PAPER

    Secure Mobile Transactions - fact or fiction?

    Are banking and payment apps adequately secure against today’s attacks? Understand the threat landscape and how an evolutionary security strategy can deliver long term protection.

    READ WHITE PAPER

Related content

About

About
Cryptomatic

White Papers

Access all
White Papers

Case Studies

Read all
Case Studies

Blog

Check out
our Blog