Click here to close now.




















Welcome!

News Feed Item

INSIDE Secure Acquires Metaforic, Gaining Access to Key Technologies for Enabling Cloud-Based Mobile Payments Security With Host Card Emulation (HCE)

INSIDE Secure (NYSE Euronext: INSD), a leader in embedded security solutions for mobile and connected devices, today announced that it has acquired Metaforic, a leader in the development of software obfuscation1 technologies and encryption-related security software for a variety of industries, including the mobile payment and mobile banking markets. Such Metaforic technologies are critical to securing Host Card Emulation (HCE)-based mobile payments, mobile wallets and mobile banking applications. A venture capital-backed company, Metaforic has headquarters in Scotland and operations in Silicon Valley (California).

The Supervisory Board of INSIDE Secure has unanimously approved this transaction.

By leveraging INSIDE Secure’s strong security capabilities, the combined comprehensive solution will lead to additional sales, and reinforce INSIDE Secure’s position as a key player in the fast-growing mobile security solutions market, as Metaforic:

  • Complements existing INSIDE Secure enterprise secure access (Virtual-Private-Network or VPN products) and content protection (Digital Right Management or DRM products) solutions by adding mobile payments and uniquely positions INSIDE Secure as the only company able to provide security solutions for enterprise secure access, digital entertainment and financial services markets, the three key market drivers for mobile security;
  • Extends INSIDE Secure’s lead in providing the most comprehensive system solution offering (hardware, software and IP) in the security industry from secure software solutions to alternative secure element-based hardware and IP. Such solutions are designed to target smartphones and other mobile device markets and to overcome upcoming architectural and certification discontinuities in mobile security;
  • Brings an extensive, high quality security intellectual property and technology portfolio, in line with INSIDE Secure’s long-term strategy to expand its own IP licensing revenue;
  • Complements INSIDE Secure’s know-how with a talented team of highly qualified employees located in the UK and the US;
  • Expands INSIDE Secure’s customer base in the mobile and payment industries.

At closing, INSIDE Secure paid US$11.6 million in cash in consideration for the shares, and could pay in 2015 an additional amount of up to US$4.5 million subject to completion of certain 2014 business milestones.

Commenting on this announcement, Rémy de Tonnac, Chief Executive Officer of INSIDE Secure, said: "The Metaforic acquisition is superbly aligned with INSIDE Secure’s strategy. Metaforic brings critical technologies to address HCE-based, cloud-based mobile payment solutions which will become mainstream following support announced by major payment brands. It will uniquely position INSIDE Secure as the only company able to provide security solutions for enterprise secure access, digital entertainment and financial services markets, the three key market drivers for mobile security.”

Andrew McLennan, Chief Executive Officer of Metaforic, stated: "We are delighted to join INSIDE Secure and bring our key software obfuscation and encryption-related security software, in order to accelerate our jointly held vision to secure all aspects of mobile life. The tight integration of Metaforic’s technology within INSIDE Secure’s offering will bring to the market the world’s most comprehensive, mobile security system solution.

About Metaforic’s software products

Metaforic’s range of award-winning software products provide the highest level of protection for core payment functions and secure data exchange, whilst running entirely in software. These solutions protect data-at-rest, data-in-transit or data-in-use, bringing complete communications privacy, encryption key protection and data security to critical applications, and addressing growing security needs from major blue chip companies.

The acquisition of Metaforic follows a two year partnership between the two companies with INSIDE Secure having licensed Metaforic’s technology for its content protection (DRM) solutions. Metaforic will be integrated within INSIDE Secure’s Mobile Security division.

About Host Card Emulation

Introduced on Android 4.4 (KitKat) and recently supported by major payment brands, Host Card Emulation (HCE) allows for contactless payments (and other services including loyalty programs, building access and transit passes) to be made directly between consumers' banks mobile application and retailers point-of-sale using NFC technology. It allows sensitive data used to facilitate transactions to be stored on, and accessed from, cloud servers rather than a mobile device and without the use of a secure element or a SIM card.

Conference call details

Rémy de Tonnac, Chief Executive Officer of INSIDE Secure, jointly with Richard Vacher Detournière, General Manager and Chief Financial Officer, will comment on the acquisition of Metaforic and will be available to answer questions during a conference call to be held on April 7, 2014 at 3pm CET / 2pm GMT / 9am EST. The call will be held in English. To participate to the conference call, you may call the following numbers prior to the scheduled start time: +33 (0)1 70 77 09 36 (France) or +44 (0) 203 367 94 53 (United Kingdom) or + (1) 855 402 77 64 (USA). A replay of the conference call will also be available approximately two hours following the conference call and for 90 days on the Group’s website. This press release and other presentation materials will be available on INSIDE Secure’s website: www.insidesecure.com

About INSIDE Secure

INSIDE Secure (NYSE Euronext Paris FR0010291245 – INSD) provides comprehensive embedded security solutions. World-leading companies rely on INSIDE Secure’s mobile security and secure transaction offerings to protect critical assets including connected devices, content, services, identity and transactions. Unmatched security expertise combined with a comprehensive range of IP, semiconductors, software and associated services gives INSIDE Secure customers a single source for advanced solutions and superior investment protection. For more information, visit www.insidesecure.com.

Forward-looking statements

This press release contains certain forward-looking statements concerning the INSIDE Secure group. Although INSIDE Secure believes its expectations to be based on reasonable assumptions, they do not constitute guarantees of future performance. The Group's actual results may accordingly differ materially from those anticipated in these forward-looking statements owing to a number of risks and uncertainties. For a more detailed description of these risks and uncertainties, please refer to the "Risk Factors" section of the annual financial report of April 24, 2013, available at www.insidesecure.com.

1 Obfuscation technology in particular is used to enhance applications security by intentionally making software more difficult to understand and to reverse-engineer

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
"We've just seen a huge influx of new partners coming into our ecosystem, and partners building unique offerings on top of our API set," explained Seth Bostock, Chief Executive Officer at IndependenceIT, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
Digital Transformation is the ultimate goal of cloud computing and related initiatives. The phrase is certainly not a precise one, and as subject to hand-waving and distortion as any high-falutin' terminology in the world of information technology. Yet it is an excellent choice of words to describe what enterprise IT—and by extension, organizations in general—should be working to achieve. Digital Transformation means: handling all the data types being found and created in the organizat...
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
Chuck Piluso presented a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Prior to Secure Infrastructure and Services, Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competitive Local Exchange Carrier licensed by the Public Service Commission in 10 states, serving as the company's chairman and president from 1997 to 2000. Between 1990 and 1997, Mr. Piluso served as chairman & founder of International Te...
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
SYS-CON Events announced today that MobiDev, a software development company, will exhibit at the 17th International Cloud Expo®, which will take place November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software development company with representative offices in Atlanta (US), Sheffield (UK) and Würzburg (Germany); and development centers in Ukraine. Since 2009 it has grown from a small group of passionate engineers and business managers to a full-scale mobi...
With SaaS use rampant across organizations, how can IT departments track company data and maintain security? More and more departments are commissioning their own solutions and bypassing IT. A cloud environment is amorphous and powerful, allowing you to set up solutions for all of your user needs: document sharing and collaboration, mobile access, e-mail, even industry-specific applications. In his session at 16th Cloud Expo, Shawn Mills, President and a founder of Green House Data, discussed h...
For IoT to grow as quickly as analyst firms’ project, a lot is going to fall on developers to quickly bring applications to market. But the lack of a standard development platform threatens to slow growth and make application development more time consuming and costly, much like we’ve seen in the mobile space. In his session at @ThingsExpo, Mike Weiner, Product Manager of the Omega DevCloud with KORE Telematics Inc., discussed the evolving requirements for developers as IoT matures and conducte...
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. In his session at 15th Cloud Expo, Michael Meiner, an Engineering Director at Oracle, Corporation, analyzed a range of cloud offerings (IaaS, PaaS, SaaS) and discussed the benefits/challenges of migrating to each offe...
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.
In their session at 17th Cloud Expo, Hal Schwartz, CEO of Secure Infrastructure & Services (SIAS), and Chuck Paolillo, CTO of Secure Infrastructure & Services (SIAS), provide a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. In his role as CEO of Secure Infrastructure & Services (SIAS), Hal Schwartz provides leadership and direction for the company.
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
The Internet of Everything (IoE) brings together people, process, data and things to make networked connections more relevant and valuable than ever before – transforming information into knowledge and knowledge into wisdom. IoE creates new capabilities, richer experiences, and unprecedented opportunities to improve business and government operations, decision making and mission support capabilities.