Benjamin Mah, CEO of V-Key shares how people-first payment technologies will transform the fintech industry and how digital security pioneer V-Key is enabling this.
With global cumulative investment in financial technology (fintech) forecast to exceed US$150 billion in three to five years, economies around the world are vying to attract fintech innovators and cash in on this growing industry.
V-Key is building towards a soon-to-be-realized future where all mobile users can enjoy unprecedented security and convenience. Take a peek ahead with us, and share our vision of what the future of mobile security looks like.
Banks in Southeast Asia should look towards software-based biometrics as the way forward to navigate the regulatory differences in the region and secure their customers’ transactions.
V-OS is the world’s first virtual secure element. Cryptography plays a dual-role in these; to secure and manage the secrets kept within V-OS, and to provide a lightweight yet comprehensive cryptographic library.
Slightly over a year into our partnership with UOB, we checked in with Dennis Koh, First Vice President of UOB. He shares with us how V-Key has worked with UOB to secure UOB Mighty; as well as upcoming plans for further enhancing the mobile security experience for UOB’s customers.
50 minutes per day. That’s the amount of time an average user spends on Facebook, Facebook Messenger, and Instagram. There are lots of reasons for the “stickiness” of these social networking apps, but a big part of their appeal is what they don’t have—friction.
As technology evolves, banks and financial institutions have no choice but to innovate. However, when it comes to security, many still rely on traditional, costly methods.
From banks to government agencies, many organisations are intrigued by and exploring software security solutions such as mobile tokens and mobile identity systems for individual identification, authorisation and authentication.
V-OS is the world’s first virtual secure element, a software solution with security built into the firmware code. These include secret cryptographic parameters and data, which need to be randomly generated and securely persisted, and are then transformed into code and data files.