The Lighter Side Of The Cloud – Beta Testing Gone Wrong
The Lighter Side Of The Cloud – Location?
The Lighter Side Of The Cloud – Delegation

Asia Pacific region to benefit from new Cloud-based E-payment system in 2011

Asia Pacific region to benefit from new Cloud-based E-payment system in 2011

Monday, December, 20th, 2010 – Introducing a new approach to electronic payment which will improve transaction times and authentication methods. Akamai’s planned cloud-based e-payment system is the next big thing to hit Asia Pacific in 2011 in the field of online financial services. One of the major concerns for people using such services is the security risk. All these factors have been taken into consideration by Akamai which aims at reducing cost of security compliance for businesses.

Akamai Technologies is a well reputed company that provides distributed platform services for global internet. The company has started off by introducing a new tokenization method (Edge tokenization) by which businessmen and online retailers can convert credit card info into tokens in the Akamai cloud. This will make the info less susceptible to interception. According to marketing resources at Akamai, the e-payment system will run on Akamai servers which are embedded within ISPs and worldwide telecom providers. It was first assumed that the system would be launched on Akamai’s data centre but that is not the case. The company has a vast server setup with 77, 000 servers which are spanned over 90 countries. The main responsibility of these servers is optimization of web content, latency reduction, enhancing online delivery of data and enabling high quality online services. With such extensive setup, it would seem that Akamai has done its homework for the upcoming launch and the system to be introduced is going to be good news for the people of Asia Pacific.

The system is compliant with PCI DSS (Payment Card Industry Data Security Standard) which provides cost efficiency for merchants and traders. Edge tokenization described before will reduce the security costs. As a result, we can expect fewer security breaches and that too, at a nominal price. Edge Tokenization will also deliver infrastructure and performance benefits by routing a customer’s credit card information through the cloud-based infrastructure. By doing this data theft can be reduced and additionally transaction times will be reduced greatly.

Akamai’s launch of this e-payment system is very much in line with the IT development that is the highlight of the APAC region. Telecom providers need proper infrastructure if they are to support and host such cloud computing services. Cloud services will be more inclined towards private cloud models for 2011. The trends in the APAC region are very promising as this area is considered to be a ripe market for future IT investments with IT giants like China, Philippines and India hard at work.

One can only hope that such services continue to serve end-users as well as enterprises, providing an economical and secure alternative for financial transactions.

Follow Us

CloudBuzz

CloudBuzz is an exceptional place to discover trending stories from around the world and be on top of new technologies each and every day. Here, you can find what is trending from some of the largest technology influencers such as Wired, Forbes, MIT, Gartner, IDC and many more. Stories will be a blend of aggregated and curated pieces for quick easy viewing on topics such as Cloud Computing, Wearable Technology, Internet of Things, Virtual Reality and much more...
Follow Us

Sorry, comments are closed for this post.

Popular

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model enables him to “own the base, rent the spike” when it comes to unplanned events. Let’s face it – maintaining unused infrastructure for rare or random IT events is expensive and unnecessary in a cloud…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Five Signs The Internet of Things Is About To Explode

Five Signs The Internet of Things Is About To Explode

The Internet of Things Is About To Explode By 2020, Gartner estimates that the Internet of Things (IoT) will generate incremental revenue exceeding $300 billion worldwide. It’s an astoundingly large figure given that the sector barely existed three years ago. We are now rapidly evolving toward a world in which just about everything will become…

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing – A Requirement For Greater Innovation

Cloud computing – Greater Innovation! Sao Paulo, Brazil has had trouble with both energy and water supplies as of late. Despite it is the rainy period. Unfortunately Sao Paulo is very dependent on its rain as a majority of its power is generated from large dams. No water, no energy. Difficult situation for a city…

Public vs. Private vs. Hybrid: Which Cloud Is Right for Your Business?

Public vs. Private vs. Hybrid: Which Cloud Is Right for Your Business?

Public vs. Private vs. Hybrid The debate surrounding the deliverability of cloud computing is coming to a close. Businesses have begun to rapidly adopt the use of cloud services, courtesy the ROI this disruptive technology brings to the table. They have finally realized they cannot afford to ignore the cloud. A Forrester study found that…

Recent

The Importance Of Cloud Security For Wearable Technology

The Importance Of Cloud Security For Wearable Technology

Wearable Technology Starts With Cloud Security The integration of wearable technology into our society is all but inevitable. Today, major players in the wearable tech field include Google, Fitbit, Boston Scientific and Apple. As users continue to demand ever increasing availability and functionality from their devices, so do security concerns for wearable tech. The future…

Customer Success Guidelines – In A World Gone Cloud

Customer Success Guidelines – In A World Gone Cloud

Customer Success Guidelines for Maximum Upselling and Cross-Selling in a World Gone Cloud With the growth of the subscription economy, companies can no longer assume that a sale means that the deal is closed. Companies need to prove their worth every minute of every hour, every hour of every day and so on. A big…

Why You Should Be Concerned About Drone Security

Why You Should Be Concerned About Drone Security

Why You Should Be Concerned About Drone Security Over the past decade, drones, also known as UAVs (unmanned aerial vehicles), have become a fact of life. Beginning as underpublicized but extremely effective items in the U.S. military’s arsenal, drones have since come into wide use by government agencies for everything from geographic surveys to law…

Contact Us

Sending
cisco_logo_100x100 vmware citrix100
Site 24x7 200px-KPMG


Contributor Spotlight

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Branded Content Programs

Advertising