Payment Transaction Security

Overview

"By combining point-to-point encryption and data tokenisation, our solutions address the root cause of data theft by removing cardholder data from the retail environment. Expertise: Experts agree that solutions like our Tamper-Resistant Security Module-based (TRSM) E2EE solution require minimal infrastructure changes. Verifone offers the only proven tokenisation security architecture currently used in significant processor/acquirer environments. Proven Solution: Our encryption solutions are deployed worldwide, giving our customers the long-term security vision demanded by today’s dynamic payments environment."

Overview

"Our repair facility fulfills customer application and secure key-load services which are closely integrated during the repair and despatch of customer hardware. Loads are performed in a secure zone according to annual Card Association and Card Acquires audit processes... New and refurbished terminals undergo software and key load processes at our warehouse and repair centre. This is undertaken in a secure area by our staff and logged in our management application as part of a required audit process. We do inject keys for PIN entry and End to End Data Encryption and other bespoke requirements..."

TOP