Welcome!

News Feed Item

INSIDE Secure Acquires Metaforic, Gaining Access to Key Technologies for Enabling Cloud-Based Mobile Payments Security With Host Card Emulation (HCE)

INSIDE Secure (NYSE Euronext: INSD), a leader in embedded security solutions for mobile and connected devices, today announced that it has acquired Metaforic, a leader in the development of software obfuscation1 technologies and encryption-related security software for a variety of industries, including the mobile payment and mobile banking markets. Such Metaforic technologies are critical to securing Host Card Emulation (HCE)-based mobile payments, mobile wallets and mobile banking applications. A venture capital-backed company, Metaforic has headquarters in Scotland and operations in Silicon Valley (California).

The Supervisory Board of INSIDE Secure has unanimously approved this transaction.

By leveraging INSIDE Secure’s strong security capabilities, the combined comprehensive solution will lead to additional sales, and reinforce INSIDE Secure’s position as a key player in the fast-growing mobile security solutions market, as Metaforic:

  • Complements existing INSIDE Secure enterprise secure access (Virtual-Private-Network or VPN products) and content protection (Digital Right Management or DRM products) solutions by adding mobile payments and uniquely positions INSIDE Secure as the only company able to provide security solutions for enterprise secure access, digital entertainment and financial services markets, the three key market drivers for mobile security;
  • Extends INSIDE Secure’s lead in providing the most comprehensive system solution offering (hardware, software and IP) in the security industry from secure software solutions to alternative secure element-based hardware and IP. Such solutions are designed to target smartphones and other mobile device markets and to overcome upcoming architectural and certification discontinuities in mobile security;
  • Brings an extensive, high quality security intellectual property and technology portfolio, in line with INSIDE Secure’s long-term strategy to expand its own IP licensing revenue;
  • Complements INSIDE Secure’s know-how with a talented team of highly qualified employees located in the UK and the US;
  • Expands INSIDE Secure’s customer base in the mobile and payment industries.

At closing, INSIDE Secure paid US$11.6 million in cash in consideration for the shares, and could pay in 2015 an additional amount of up to US$4.5 million subject to completion of certain 2014 business milestones.

Commenting on this announcement, Rémy de Tonnac, Chief Executive Officer of INSIDE Secure, said: "The Metaforic acquisition is superbly aligned with INSIDE Secure’s strategy. Metaforic brings critical technologies to address HCE-based, cloud-based mobile payment solutions which will become mainstream following support announced by major payment brands. It will uniquely position INSIDE Secure as the only company able to provide security solutions for enterprise secure access, digital entertainment and financial services markets, the three key market drivers for mobile security.”

Andrew McLennan, Chief Executive Officer of Metaforic, stated: "We are delighted to join INSIDE Secure and bring our key software obfuscation and encryption-related security software, in order to accelerate our jointly held vision to secure all aspects of mobile life. The tight integration of Metaforic’s technology within INSIDE Secure’s offering will bring to the market the world’s most comprehensive, mobile security system solution.

About Metaforic’s software products

Metaforic’s range of award-winning software products provide the highest level of protection for core payment functions and secure data exchange, whilst running entirely in software. These solutions protect data-at-rest, data-in-transit or data-in-use, bringing complete communications privacy, encryption key protection and data security to critical applications, and addressing growing security needs from major blue chip companies.

The acquisition of Metaforic follows a two year partnership between the two companies with INSIDE Secure having licensed Metaforic’s technology for its content protection (DRM) solutions. Metaforic will be integrated within INSIDE Secure’s Mobile Security division.

About Host Card Emulation

Introduced on Android 4.4 (KitKat) and recently supported by major payment brands, Host Card Emulation (HCE) allows for contactless payments (and other services including loyalty programs, building access and transit passes) to be made directly between consumers' banks mobile application and retailers point-of-sale using NFC technology. It allows sensitive data used to facilitate transactions to be stored on, and accessed from, cloud servers rather than a mobile device and without the use of a secure element or a SIM card.

Conference call details

Rémy de Tonnac, Chief Executive Officer of INSIDE Secure, jointly with Richard Vacher Detournière, General Manager and Chief Financial Officer, will comment on the acquisition of Metaforic and will be available to answer questions during a conference call to be held on April 7, 2014 at 3pm CET / 2pm GMT / 9am EST. The call will be held in English. To participate to the conference call, you may call the following numbers prior to the scheduled start time: +33 (0)1 70 77 09 36 (France) or +44 (0) 203 367 94 53 (United Kingdom) or + (1) 855 402 77 64 (USA). A replay of the conference call will also be available approximately two hours following the conference call and for 90 days on the Group’s website. This press release and other presentation materials will be available on INSIDE Secure’s website: www.insidesecure.com

About INSIDE Secure

INSIDE Secure (NYSE Euronext Paris FR0010291245 – INSD) provides comprehensive embedded security solutions. World-leading companies rely on INSIDE Secure’s mobile security and secure transaction offerings to protect critical assets including connected devices, content, services, identity and transactions. Unmatched security expertise combined with a comprehensive range of IP, semiconductors, software and associated services gives INSIDE Secure customers a single source for advanced solutions and superior investment protection. For more information, visit www.insidesecure.com.

Forward-looking statements

This press release contains certain forward-looking statements concerning the INSIDE Secure group. Although INSIDE Secure believes its expectations to be based on reasonable assumptions, they do not constitute guarantees of future performance. The Group's actual results may accordingly differ materially from those anticipated in these forward-looking statements owing to a number of risks and uncertainties. For a more detailed description of these risks and uncertainties, please refer to the "Risk Factors" section of the annual financial report of April 24, 2013, available at www.insidesecure.com.

1 Obfuscation technology in particular is used to enhance applications security by intentionally making software more difficult to understand and to reverse-engineer

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
To Really Work for Enterprises, MultiCloud Adoption Requires Far Better and Inclusive Cloud Monitoring and Cost Management … But How? Overwhelmingly, even as enterprises have adopted cloud computing and are expanding to multi-cloud computing, IT leaders remain concerned about how to monitor, manage and control costs across hybrid and multi-cloud deployments. It’s clear that traditional IT monitoring and management approaches, designed after all for on-premises data centers, are falling short in ...
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been designed around data privacy," explained Julian Box, CEO and co-founder of Calligo, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and G...
With more than 30 Kubernetes solutions in the marketplace, it's tempting to think Kubernetes and the vendor ecosystem has solved the problem of operationalizing containers at scale or of automatically managing the elasticity of the underlying infrastructure that these solutions need to be truly scalable. Far from it. There are at least six major pain points that companies experience when they try to deploy and run Kubernetes in their complex environments. In this presentation, the speaker will d...
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, discussed how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He also discussed how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
We are seeing a major migration of enterprises applications to the cloud. As cloud and business use of real time applications accelerate, legacy networks are no longer able to architecturally support cloud adoption and deliver the performance and security required by highly distributed enterprises. These outdated solutions have become more costly and complicated to implement, install, manage, and maintain.SD-WAN offers unlimited capabilities for accessing the benefits of the cloud and Internet. ...
"DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited to help the great team at @DevOpsSUMMIT and CloudEXPO tell the world how they can leverage this emerging disruptive trend."
In this presentation, you will learn first hand what works and what doesn't while architecting and deploying OpenStack. Some of the topics will include:- best practices for creating repeatable deployments of OpenStack- multi-site considerations- how to customize OpenStack to integrate with your existing systems and security best practices.
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.