Er Chiang Kai - CTO
Chiang Kai is an experienced software development leader, specializing in the design and development of security…
Traditional security methods such as passwords are under increased stress due to online attacks and users’ continued usage of weak passwords or sharing of passwords across multiple online devices.
Traditional security methods such as passwords are under increased stress due to online attacks and users’ continued usage of weak passwords or sharing of passwords across multiple online devices.
As a result, banks and governments are looking to significantly increase their standards of mobile security. However, they do face a number of challenges:
Enterprises have their own set of challenges:
Cloud-Based Payments make use of tokenized credit card keys and other fraud detection mechanisms to mitigate the security risks of a purely software-based mobile security approach.
Cloud-Based Payments make use of tokenized credit card keys and other fraud detection mechanisms to mitigate the security risks of a purely software-based mobile security approach.
However, banks need to put in place additional mobile software security mechanisms to protect their mobile payments from cyber-attacks.
In protecting payments, the main challenges banks face are:
Today, banks, governments and enterprises are looking to fortify mobile security measures and protect data such as Personal Identifiable Information (PII) from security lapses and attacks.
Today, banks, governments and enterprises are looking to fortify mobile security measures and protect data such as Personal Identifiable Information (PII) from security lapses and attacks.
Verification of identity has always been based on face-to-face interactions and on physical documents and processes. On-going day to day verification of identity has also been largely based on physical devices (cards, passports and the like) issued by ‘trusted entities’ such as banks or governments.
The transition to a digital economy has changed that, and mandates a very different approach to identity systems.
In a world that is increasingly governed by digital transactions and data, and with mobile authentication and mobile payments becoming more commonplace, our existing methods for managing security and privacy are no longer adequate. Instances of data breaches, identity theft and large-scale fraud are on the rise.
In addition, a significant portion of the world’s population lacks the necessary digital credentials to fully participate in the digital economy.
Our technology is designed to address the multiple issues that banks, government agencies and enterprises face with every transaction and every interaction. Thus identity, and the protection and controlled use of data and attributes associated with identity and authentication, are central to our approach.
Since its inception, V-Key has been the proud recipient of multiple accolades from all over the world.
Here is a summary of our growing list of awards.
V-Key products have also been recognized by numerous testing and accreditation bodies around the globe.V-OS Virtual Secure Element has been internationally patented in the USA, Singapore, and Australia, and is patent-pending in Europe and China.
V-OS Virtual Secure Element has been accredited by the Infocommunications Media Development Authority of Singapore (IMDA), the technology development and regulation statutory board of the Singapore government.
V-OS Virtual Secure Element is FIPS 140-2 Level 1 Validated by the US government’s National Institute for Standards and Technology (NIST) Cryptographic Module Verification Program (CMVP).
V-OS Virtual Secure Element is the world’s first virtual secure element to receive a Common Criteria Evaluation Assurance Level (EAL) rating of 3+, derived from the U.S. Government’s Protection Profile for General Purpose Operating Systems.
V-OS Virtual Secure Element’s cybersecurity resiliency is unquestionable, and has never been broken in more than 9 security penetration tests.
We have set up a partner program and are actively engaged on projects with two of the top five global consultancies. We also form partnerships at a local level with our customers’ incumbent systems integrators and secure managed
services suppliers.
To become a V-Key Partner, please contact us below.
RESELLER PARTNERS
CLOUD PARTNERS
TECHNOLOGY PARTNER