|By Business Wire||
|April 7, 2014 01:00 AM EDT||
INSIDE Secure (NYSE Euronext: INSD), a leader in embedded security solutions for mobile and connected devices, today announced that it has acquired Metaforic, a leader in the development of software obfuscation1 technologies and encryption-related security software for a variety of industries, including the mobile payment and mobile banking markets. Such Metaforic technologies are critical to securing Host Card Emulation (HCE)-based mobile payments, mobile wallets and mobile banking applications. A venture capital-backed company, Metaforic has headquarters in Scotland and operations in Silicon Valley (California).
The Supervisory Board of INSIDE Secure has unanimously approved this transaction.
By leveraging INSIDE Secure’s strong security capabilities, the combined comprehensive solution will lead to additional sales, and reinforce INSIDE Secure’s position as a key player in the fast-growing mobile security solutions market, as Metaforic:
- Complements existing INSIDE Secure enterprise secure access (Virtual-Private-Network or VPN products) and content protection (Digital Right Management or DRM products) solutions by adding mobile payments and uniquely positions INSIDE Secure as the only company able to provide security solutions for enterprise secure access, digital entertainment and financial services markets, the three key market drivers for mobile security;
- Extends INSIDE Secure’s lead in providing the most comprehensive system solution offering (hardware, software and IP) in the security industry from secure software solutions to alternative secure element-based hardware and IP. Such solutions are designed to target smartphones and other mobile device markets and to overcome upcoming architectural and certification discontinuities in mobile security;
- Brings an extensive, high quality security intellectual property and technology portfolio, in line with INSIDE Secure’s long-term strategy to expand its own IP licensing revenue;
- Complements INSIDE Secure’s know-how with a talented team of highly qualified employees located in the UK and the US;
- Expands INSIDE Secure’s customer base in the mobile and payment industries.
At closing, INSIDE Secure paid US$11.6 million in cash in consideration for the shares, and could pay in 2015 an additional amount of up to US$4.5 million subject to completion of certain 2014 business milestones.
Commenting on this announcement, Rémy de Tonnac, Chief Executive Officer of INSIDE Secure, said: "The Metaforic acquisition is superbly aligned with INSIDE Secure’s strategy. Metaforic brings critical technologies to address HCE-based, cloud-based mobile payment solutions which will become mainstream following support announced by major payment brands. It will uniquely position INSIDE Secure as the only company able to provide security solutions for enterprise secure access, digital entertainment and financial services markets, the three key market drivers for mobile security.”
Andrew McLennan, Chief Executive Officer of Metaforic, stated: "We are delighted to join INSIDE Secure and bring our key software obfuscation and encryption-related security software, in order to accelerate our jointly held vision to secure all aspects of mobile life. The tight integration of Metaforic’s technology within INSIDE Secure’s offering will bring to the market the world’s most comprehensive, mobile security system solution.”
About Metaforic’s software products
Metaforic’s range of award-winning software products provide the highest level of protection for core payment functions and secure data exchange, whilst running entirely in software. These solutions protect data-at-rest, data-in-transit or data-in-use, bringing complete communications privacy, encryption key protection and data security to critical applications, and addressing growing security needs from major blue chip companies.
The acquisition of Metaforic follows a two year partnership between the two companies with INSIDE Secure having licensed Metaforic’s technology for its content protection (DRM) solutions. Metaforic will be integrated within INSIDE Secure’s Mobile Security division.
About Host Card Emulation
Introduced on Android 4.4 (KitKat) and recently supported by major payment brands, Host Card Emulation (HCE) allows for contactless payments (and other services including loyalty programs, building access and transit passes) to be made directly between consumers' banks mobile application and retailers point-of-sale using NFC technology. It allows sensitive data used to facilitate transactions to be stored on, and accessed from, cloud servers rather than a mobile device and without the use of a secure element or a SIM card.
Conference call details
Rémy de Tonnac, Chief Executive Officer of INSIDE Secure, jointly with Richard Vacher Detournière, General Manager and Chief Financial Officer, will comment on the acquisition of Metaforic and will be available to answer questions during a conference call to be held on April 7, 2014 at 3pm CET / 2pm GMT / 9am EST. The call will be held in English. To participate to the conference call, you may call the following numbers prior to the scheduled start time: +33 (0)1 70 77 09 36 (France) or +44 (0) 203 367 94 53 (United Kingdom) or + (1) 855 402 77 64 (USA). A replay of the conference call will also be available approximately two hours following the conference call and for 90 days on the Group’s website. This press release and other presentation materials will be available on INSIDE Secure’s website: www.insidesecure.com
About INSIDE Secure
INSIDE Secure (NYSE Euronext Paris FR0010291245 – INSD) provides comprehensive embedded security solutions. World-leading companies rely on INSIDE Secure’s mobile security and secure transaction offerings to protect critical assets including connected devices, content, services, identity and transactions. Unmatched security expertise combined with a comprehensive range of IP, semiconductors, software and associated services gives INSIDE Secure customers a single source for advanced solutions and superior investment protection. For more information, visit www.insidesecure.com.
This press release contains certain forward-looking statements concerning the INSIDE Secure group. Although INSIDE Secure believes its expectations to be based on reasonable assumptions, they do not constitute guarantees of future performance. The Group's actual results may accordingly differ materially from those anticipated in these forward-looking statements owing to a number of risks and uncertainties. For a more detailed description of these risks and uncertainties, please refer to the "Risk Factors" section of the annual financial report of April 24, 2013, available at www.insidesecure.com.
1 Obfuscation technology in particular is used to enhance applications security by intentionally making software more difficult to understand and to reverse-engineer
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
Oct. 1, 2016 08:00 AM EDT Reads: 2,250
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
Oct. 1, 2016 08:00 AM EDT Reads: 1,309
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Oct. 1, 2016 07:30 AM EDT Reads: 1,173
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
Oct. 1, 2016 07:00 AM EDT Reads: 1,865
Digitization is driving a fundamental change in society that is transforming the way businesses work with their customers, their supply chains and their people. Digital transformation leverages DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations to capitalize on opportunities and create competitive differentiation in the application economy. However, information security has been notably absent from the DevOps movement. Speed doesn’t have to negat...
Oct. 1, 2016 07:00 AM EDT Reads: 2,402
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
Oct. 1, 2016 06:30 AM EDT Reads: 1,931
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
Oct. 1, 2016 06:15 AM EDT Reads: 809
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
Oct. 1, 2016 06:00 AM EDT Reads: 1,945
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
Oct. 1, 2016 06:00 AM EDT Reads: 2,807
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
Oct. 1, 2016 05:45 AM EDT Reads: 1,342
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
Oct. 1, 2016 05:30 AM EDT Reads: 642
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
Oct. 1, 2016 05:15 AM EDT Reads: 1,438
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
Oct. 1, 2016 05:00 AM EDT Reads: 4,758
Adobe is changing the world though digital experiences. Adobe helps customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide-from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on its established design leadership, Adobe enables customers not o...
Oct. 1, 2016 04:45 AM EDT Reads: 580
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Oct. 1, 2016 04:30 AM EDT Reads: 1,827