The company's Secure Mobile Payment software works with Windows Mobile 5.0 and RIM 4.1 devices.
Mobile application developer Charge Anywhere unveiled its Secure Mobile Payment software that it said can be used with smartphone and pocket PCs that are compatible with Windows Mobile 5.0 and Research In Motion 4.1 devices.
Charge Anywhere said Monday that the software turns mobile handsets into secure wireless mobile point-of-sale (MPOS) terminals, and helps businesses and system integrators build toward achieving compliance with Level 3 and Level 4 Payment Card Industry (PCI) thresholds.
The software works with devices like Motorola's Moto Q; HTC's Touch and Mogul series; Glofiish x800, Palm's Treo 700wwx; and RIM's BlackBerry 8703e, 8870 World Edition and Pearl 8210 handset models, Charge Anywhere said, in a statement.
The secure mobile payment software offers over-the-air deployment with automatic security, functionality, and content updates to comply with PCI Data Security Standard requirements. The software also allows users to view, search, and export transactional data, as well as detailed business information such as invoice numbers, employee ID, or GPS data, all in real time using ComsGate's Web-based Transaction Manager. Secure Mobile Payment also supports several Bluetooth-enabled magnetic-stripe card readers and printers, the vendor said.
The new software is intended for businesses seeking a comprehensive mobile payment solution, according to the vendor.
"With seamless integration with QuickBooks and other back-office applications, the power of the Charge Anywhere solution enhances operational and field support efficiencies by leveraging Microsoft Windows Mobile devices and Microsoft server-to-server applications," the company said Monday, in a statement. "As an end-to-end secure mobile payment solution, it enables efficient and secure processing of electronic payment transactions virtually anywhere in the world."
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.