Implementing mobile payment systems presents a high risk, high reward opportunity.
In 2011 mobile applications went mainstream, captivating consumers with fun games, useful utilities, and plenty of branding thrown in there for good measure. As businesses continue to pump out new applications to engage with customers, it is likely that developers will be asked to shift gears to reprioritize mobile apps as a marketing vehicle into something that drives top-line revenue into company coffers.
However, that kind of shift will require companies to dive headfirst into mobile payments, a prospect both thrilling and terrifying at once to savvy CIOs. Because though there is tremendous opportunity to grow the business through innovation with mobile payment and ordering systems, that opportunity brings a lot of risk.
An enterprise approach should follow a comprehensive and compartmentalized architectural approach based on the business needs, the opportunity, any risks, or disruptive elements of technology adoption, said Michael Iseyemi, global chief security officer for Aditya Birla Minacs. Specifically to mobile payment, the most important considerations in addition to the aforementioned items are security of the stored data, the security of the data transmission while it is in transit, and who the data is being transmitted to.
Organizations are finding it difficult to keep these principles in mind during the headlong rush into mobile payment system development, said Randall Rivera, senior enterprise architect for Excellis Interactive. His firm is currently working with a lot of Fortune 500 companies to help them securely build a mobile component into their business strategies. One of the first thing he advises them to do is take stock of what their current e-commerce systems already look like and try to leverage what security measures they already have in place.
At the end of the day, mobile is just another outlet and it should work under the same umbrella as other systems, he said. If you architect it properly, all of the systems go under the same service. If you've got the infrastructure to leverage, don't build it from scratch.
How can companies find and fix vulnerabilities before they lead to a breach? Better yet, how can software developers identify flaws in their applications before the new software is ever deployed? In this report, Eliminating Vulnerabilities In Enterprise Software, Dark Reading offers a look at some tips and tricks for software development and vulnerability assessment. (Free registration required.)
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.