How to Make Mobile Payments Frictionless, Open and Secure for Everyone

Presented by

Andrew Cole, CFO | Felix Payment Systems; Noah Fitzgerald, COO | Felix Payment Systems; Krishna Vishnubhotla | Zimperium

About this talk

Mobile Point of Sale (mPOS) systems have revolutionized how merchants accept payments globally. Merchants can now instantly accept contactless payments using the NFC reader on off-the-shelf mobile devices. As a result of the technological innovation driving ease-of-use, the global value for mPOS transactions in 2021 has now surpassed $2.49 trillion, and 54% of businesses have used mobile POS for processing transactions. But widespread, global use does not ensure that these solutions are secure and compliant. Felix Payment Systems (FPS) is on a mission to build disruptive technology that makes payment processing more scalable, accessible, and secure. Headquartered in Vancouver B.C., Canada, Felix Payment Systems Ltd., is the world’s leading provider of cloud EMV (Europay, Mastercard, and Visa) payment technology. In this on-demand webinar, FPS discusses how they prioritized security by building a fraud resistant payment solution with Zimperium. In this webinar, we discuss: - Common blind spots related to mobile payment security - What distinguished FPS’s approach to enabling touchless payments - How FPS actively minimizes fraud - Key trends in the mobile payments space

Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (12)
Subscribers (1479)
As the only mobile security platform purpose-built for enterprise environments, Zimperium provides security solutions for mobile devices and applications, ensuring safe and secure access to critical data. Our patented, on-device, machine learning-based security provides visibility and protection against known threats and zero-day attacks, and our mobile application protection suite combines comprehensive in-app protection with centralized threat visibility. Here we share resources and information related to our mobile threat research, and best practices for securing mobile devices and mobile applications in the context of the modern threat landscape.