OVERCOMING DATA SECURITY CHALLENGES IN RETAIL PETROLEUM

Size: px
Start display at page:

Download "OVERCOMING DATA SECURITY CHALLENGES IN RETAIL PETROLEUM"

Transcription

1 tokenex.com OVERCOMING DATA SECURITY CHALLENGES IN RETAIL PETROLEUM A TokenEx Case Study

2 Case Study OVERCOMING DATA SECURITY CHALLENGES IN RETAIL PETROLEUM TABLE OF CONTENTS Understanding Data Security Challenges in the Retail Petroleum Industry 1 Thousands of Transactions a Day, Multiple Points of Attack 1 Following The Payment Stream 1 What Looks Simple Is Very Complex 1 High Employee Turnover Inhibits Security Measures 2 EMV is More Expensive Thank You Think 2 The True Cost of EMV Adoption 2 Hidden Costs of EMV are a Back Breaker 3 EMV Doesn t Fight Fraud in the Long Run 3 Shim is the EMV Skim Petroleum Retail is Next 3 Retail Petroleum Needs Layered Security to Defeat Data Theft and Fraud 4 Strengthen Your Security Posture by Implementing a Tokenization Solution 4 Using Native Encryption Within ERP Devices Not Enough 5 On-Premise Solutions Lack Security and Don t Reduce PCI Scope 5 Flexible Tokenization Platform Provides Open Integration 5 TokenEx Supports How You Do Business 5 Tokenization Secures the Retail Petroleum Environment 6 TokenEx Understands the Complexity of Your Environment 6 A TokenEx Case Study Table of Contents

3 UNDERSTANDING DATA SECURITY CHALLENGES IN THE RETAIL PETROLEUM INDUSTRY Receiving, storing, and transmitting sensitive data presents challenges for every business. One of the riskiest datasets to handle is payment card data, since it is relatively easy to steal, sell, and use for fraudulent purchases. Due to the ubiquitous presence of the industry and its 24x7 business model, retail petroleum organizations handle huge volumes of payment data and face some of the most complex payment card data issues, putting them in the crosshairs for data theft, fraud, and costly PCI compliance. Thousands of Transactions a Day, Multiple Points of Attack Imagine an average gas station with 10 two-sided stalls, or 20 pumps and accompanying pay terminals. On a normal day that one station is going to take hundreds of transactions; hundreds of card swipes. For a large retailer with hundreds of these stations scattered across states, that s tens of thousands of opportunities for payment data theft as cards are read at the pump, payment data transmitted to the Point of Sale application in the station, routed to a payment processor, and ultimately to the financial back office systems at headquarters. This is, of course, in addition to the retail stores at the fueling stations where consumers purchase goods and pay for services using the same POS system. At any point in the payment stream terminals, POS, network, or financial database a hacker can potentially siphon off payment data. Following The Payment Stream Understanding the path of transactions for a single retail gas station provides insight into the enormous scale of large retail petroleum organizations that operate thousands of pumps and retail stores, often using multiple brands of POS systems. They are handling tremendous volumes of payment card data through their environments. Most large gas retailers with many stations are going to want to use all the collected payment data to understand patterns in consumption, affects of price changes, and track in-store sales, so all payment data is ultimately routed to an ERP financial system for analysis. In this discussion, we will focus on organizations that push payment information to headquarters for storage and analysis. It s here too, within the corporate ERP applications, that hackers are drawn to the veritable honeypot of payment data. What Looks Simple Is Very Complex Dip card, pump fuel. Simple. But keeping data secure and achieving PCI compliance in just one gas station is very challenging. The automated fuel dispenser with card dip reader where the customer initiates the transaction is just the first step. Between that automated fuel dispenser and the store POS, there are multiple technologies from multiple vendors, making interoperability another security hurdle. The challenge is to secure the acceptance channel starting at the payment card dip at the pump, through to the POS at the station, all the way to the organization s financial systems. Introducing a number of payment acceptance technologies into one data security plan is incredibly challenging, particularly because in the retail petroleum environment, the manufacturers of the different technologies have made data security the highest priority. A TokenEx Case Study Page 1 of 6

4 Securing data from the automated fuel dispenser back to the store POS is only the first challenge. You have to secure the data going to headquarters through networks and firewalls. You scrutinize the security of the back office systems, such as payment servers, that are aggregating payments from the automated fuel dispensers as well as multiple store point-of-sale systems. When payment data is being accepted at a reader, is at rest in a database or in transit over networks, it can be hacked which means any time, all the time. There are a considerable number of different security controls that need to be put in place to make sure that data is not intercepted at any point. And then there is the people problem. High Employee Turnover Inhibits Security Measures Independent of the technology of a data security plan within a retail petroleum organization, are the employees embedded in the process. Gas stations and convenience stores traditionally have a high employee turnover rate. Management spends a tremendous amount of money training and getting an employee up to speed to operate the POS, understand how to solve problems at the pump, how to work with customers. Security training includes guidelines such as: don t take pictures of payment cards, don t write them down, don t call them in over the phone, or recite the numbers over the loudspeaker in the store or out at the pump. These security breach behaviors are more common than you might expect. Employees also need to be able to identify pump tampering, when shimming and skimming devices are inserted at the fuel dispenser to record and transmit card data. Then, the trained employee moves on and the training process begins again. This predictable sequence of unfortunate events means that you must always have procedures and training in place to ensure that cardholder data is secure from people, process, and technology standpoints. This adds to the complexity and cost of a data security plan, which constantly squeezes bottom line profitability. EMV IS MORE EXPENSIVE THANK YOU THINK The next security challenge for petroleum retailers will be to make the switch to new EMV chip card readers and software by October While most retail merchants have their EMV deadline now, it s appropriate that the petroleum retailers have more time for EMV adoption because they have to address many more technologies than the standard retailer. For example, how does incorporating EMV impact the transaction flow from the automated fuel dispenser to the POS where serial connections are still used in some architectures? Ultimately, implementing EMV means that the petroleum retailer will most likely need to upgrade all technologies between the pump and the store POS for more time and money, of course. This is just one example of the significant changes to the payment stream that need to be made to accommodate EMV. The True Cost of EMV Adoption Over the next few years, the true costs of implementing EMV will become painfully apparent. First, of course, petroleum retailers will have to replace the card readers at the automated fuel dispensers and the card swipes within the stores. While the cost of replacing literally thousands of readers is the first major stumbling block, the real effort is in re-engineering the entire card-present acceptance channels to accommodate the EMV transmissions. The National Association of Convenience Stores A TokenEx Case Study Page 2 of 6

5 estimates the cost of re-engineering the payment acceptance stream starting at the automated fuel dispensers to be anywhere between $6,000 and $10,000 per device. One small store with just ten pumps has to invest up to $100,000 just to become EMV compliant at the fuel pump. The supposedly positive side is that when the EMV upgrade is completed, any fraudulent purchases committed with an EMV card at the point of purchase costs the station nothing. However, most gas stations experience only $20,000 to $30,000 worth of fraud a year. That s a three-year return on investment for the new EMV devices, yet it doesn t include the downtime and lost sales while pumps are being replaced with new fuel dispensers. You also have to account for the technical consulting costs that are needed to ensure the fuel dispenser works correctly with the other technologies from the pump all the way back into the home office. Hidden Costs of EMV are a Back Breaker The costs being reported by nacsonline.com is basically focused on just the cost of updating the automated fuel dispenser with EMV compatibility. They don t take into account the cost of testing, implementing, re-designing, and all of the technicalities that need to take place before a successful EMV implementation is complete. Your IT department and engineers expensive resources will be working on the EMV transition for the next two years to ensure a very smooth rollout, because at the end of the day, automated fuel dispensers are at the very center of taking payments. In a low margin business, retail petroleum organizations want to avoid anything getting in the way of selling goods and efficiently processing payments. EMV Doesn t Fight Fraud in the Long Run What s even more disheartening about EMV, is that it s already a deprecated technology. EMV has been around for 20 years. It was first available in the UK, Europe, and most recently Canada. Now, it s just being rolled out in the United States and the major problem is that cyber thieves have had plenty of time to figure out how to commit fraudulent activity even with EMV protected cards. In addition, while not a burning problem for petroleum retailers who primarily deal with card-present payments, EMV does very little for card-not present transactions, and the rate of fraud for those cases skyrocketed in Europe. But EMV even has card-present fraud problems with the way data is transmitted. Look at the underlying design to see why. EMV devices pass some payment card information in clear text. The basic principle behind EMV is to prevent card forgery and any additional fraudulent use of an account when a card is known to be breached. This primarily protects the banks and the card issuers. The fact that some EMV transmissions are in clear text is a clear cut case of showing that the technology is faulty in dealing with today s complex acceptance channels. EMV technologies are already subject to replay attacks where hackers actually capture and replay the data that s passing from the card chip to the reader device. This replay attack is already being used where EMV has been deployed. Shim is the EMV Skim Petroleum Retail is Next Most recently in Mexico, fraudsters have figured out a way to use what is called a shimming device, A TokenEx Case Study Page 3 of 6

6 a card and chip reader that is physically shimmed into an ATM slot. This is similar to the skimmers that read the old payment cards magstrips to capture bank information. Skimmers became a potent threat to retail petroleum because many of the pumps were literally out of sight from the attendants, letting the fraudsters insert the skimmers. Since the shimmers work in a similar manner, and can be furtively planted at a pump, it means the costly EMV implementation has already been defeated in one way, even before the rollout gains steam. Retail Petroleum Needs Layered Security to Defeat Data Theft and Fraud The retail petroleum industry has its back against the wall waiting to see if EMV sticks around. They have another two years after the general retail industry has implemented EMV to see if it is effective. But the fact that EMV has already been defeated by fraudsters in a couple of ways, means that the long-term benefits are in doubt. Combine that with the ineffectiveness of EMV to thwart cardnot-present fraud and the doubts double. What then, is the right path forward? If using EMV to secure payment data and your transaction environment sounds like a losing proposition, what s a winning plan? The winning path forward is layering the technologies of tokenization, point-to-point encryption, and real-time fraud detection. To overcome the shortcomings of EMV and eliminate payment data theft and the resulting fraud, the first step is to create a secure communication payment stream, so that even though EMV transmits data in clear text, implementing a point-to-point encryption (P2PE) solution secures the data at the point the EMV chip is read. The second step after encryption is to add a layer of tokenization so that the payment data is immediately stored in a secure cloud data vault and a token returned for all additional payment processing steps. To complete the solution, integrating a real-time fraud analysis service through the tokenization provider stops the use of already stolen payment data and breaks the cycle of payment fraud. Combining tokenization and fraud detection layers provides a complete data security solution for any organization that handles payment data. STRENGTHEN YOUR SECURITY POSTURE BY IMPLEMENTING A TOKENIZATION SOLUTION Simply put, as payments flow from automatic fuel dispenser or the store POS through the retail environment, you can t depend on a cobbled-together set of diverse security products that ends up slowing down payment processing. Especially in fueling stations, where the goal is to get filled up as quickly as possible, customers have limited patience with a slow payment system. Tokenization of payment data from pump to POS to back office takes milliseconds, so there is no delay for customers to pay, fill, and go. And while the petroleum retail industry has done a fantastic job of creating PCI islands that limit the number of systems that handle the payment card information, the goal should be to remove the toxic data completely, thus eliminating risk of data theft as well as reducing compliance costs. Any system that adds additional security to the payment stream must not slow down the transaction. Adding a tokenization layer is a proven method that is non-disruptive to existing payment processing. That means customers don t notice any change, while in the background, payment card data is securely intercepted and removed from the payment stream. A TokenEx Case Study Page 4 of 6

7 Using Native Encryption Within ERP Devices Not Enough Meanwhile, in the back office, using ERP systems such as Oracle, SAP, or JD Edwards as foundation of payment data security, relies on the native database encryption to secure data. An unfortunate aspect of using only encryption is that the data stored in the ERP database is still considered cardholder data per PCI DSS, so the scope of PCI compliance is not reduced by very much, if at all. And of course, the security of the payment data is only as good as the encryption, which has proven vulnerable time and again to sophisticated hackers. On-Premise Solutions Lack Security and Don t Reduce PCI Scope So if encryption is not enough to protect your cardholder data, is tokenization the best option? We would say Absolutely! But with one caveat. Using an on-premise solution for tokenization just creates another honeypot of toxic data within your environment that attracts hackers and fraudsters. Yes, you are passing tokens among your business systems, but the token/pan pairing is still accessible to hackers with sufficient skill to breach your database encryption. Nobody needs to have a huge glut of cardholder data in their environment which is exactly the result of using on-premise tokenization solutions and native ERP encryption solutions. At TokenEx, we tell our clients to follow a simple rule: If you don t need it, don t take it. Which means that unless there is a powerful business reason to store payment card data, you shouldn t accept, store, or transmit it at all. It s time to get the data out of your environment and put it in secure cloudbased data vaults. Using a cloud-based tokenization solution like TokenEx, each PAN you receive in payment is instantly exchanged with a mathematically-unrelated token to store in your ERP instance or e-commerce database. The PANs are completely removed from your payment stream, eliminating the risk of losing any sensitive data should a breach occur. This in turn removes most all business systems from all but the lowest, and least costly levels, of PCI compliance. Flexible Tokenization Platform Provides Open Integration Retail petroleum organizations need a solution that is flexible enough to take payments from different sources, terminals, and data types. Whether it be a credit card, a fleet card, or a branded card, acceptance must be possible across multiple types of hardware at the pump, store, or service center. Therefore, it s important that your security layers be hardware-agnostic to provide as much flexibility as you need to use hardware from Ingenico to Verifone and store tokens in the back office ERPs of choice. Your tokenization layer also needs to accommodate any of the commonly used communication protocols for e-commerce, whether it be SOAP or REST, or a future standard protocol. A flexible layered security solution gives you the ability to maneuver to meet changes in changing technology and regulations. TokenEx Supports How You Do Business Naturally, a tokenization solution has to support how you do business. More critically, your tokenization provider needs to understand how your business operates and interacts with other business systems. Most of the payment security solutions that are available today don t understand A TokenEx Case Study Page 5 of 6

8 how retail petroleum organizations do business, or the complexities of the environment. TokenEx understands the payment stream of retail petroleum, and can support how you do business today from real-time transactions through batch transactions. The TokenEx Cloud Security Platform acts as a central integrator among your acceptance channels and payment service providers, such as fraud detection partners. TokenEx is already integrated with over 40 payment processors, 4 of the 7 payment gateways, and many of the cutting-edge third-party support vendors. We solve the integration problem for you. Tokenization Secures the Retail Petroleum Environment TokenEx stands firmly behind the principles of strengthening your security posture by providing an open integration, payment provider agnostic security platform. Recognizing that native encryption won t get the job done, and on-premise tokenization creates more issues without actually reducing PCI compliance, a cloud tokenization platform is the best way to reduce data theft risk and lower PCI compliance costs. From a CSO s implementation standpoint, the first step that we at TokenEx advise is to keep your payment processes the same to minimize expensive changes to your IT architecture, and use secure batch file processing to tokenize that data and store it offsite in secure cloud data vaults. You get an instant payback by reducing both risk and compliance costs. With a cloud tokenization platform, all your payment data, whether it be transactional history from settlement or real-time transactional information that s being channeled through your payment software, is only in your environment momentarily until you send the batch file to TokenEx for vaulting. Any remittance and settlement files that are coming back from payment processors are channeled through TokenEx, so they are tokenized even before they re-enter your IT environment. Using this type of pass-through integration, you limit your exposure to risk tremendously, because you re removing toxic data from your environment and keeping it out. TokenEx Understands the Complexity of Your Environment TokenEx prides itself on understanding each of the payment technologies and processes in a retail petroleum environment from the automated fuel dispenser, to the store point of sale system, all the way back to the financial system at headquarters. We understand how to secure each step by integrating technologies such as tokenization, point-to-point encryption, and fraud detection, to reduce risk to your business and your customer. Your retail petroleum environment is one of the most complex payment streams in existence today, and we can help make it secure. TOKENEX 1350 South Boulder Suite 1100 Tulsa, Oklahoma A TokenEx Case Study Page 6 of 6

How To Comply With The New Credit Card Chip And Pin Card Standards

How To Comply With The New Credit Card Chip And Pin Card Standards My main responsibility as a Regional Account Manager for IMD is obtain the absolute lowest possible merchant fees for you as a business. Why? The more customers we can save money, the more volume of business

More information

Heartland Secure. By: Michael English. A Heartland Payment Systems White Paper 2014. Executive Director, Product Development

Heartland Secure. By: Michael English. A Heartland Payment Systems White Paper 2014. Executive Director, Product Development A Heartland Payment Systems White Paper 2014 Heartland Secure. By: Michael English Executive Director, Product Development 2014 Heartland Payment Systems. All trademarks, service marks and trade names

More information

Understand the Business Impact of EMV Chip Cards

Understand the Business Impact of EMV Chip Cards Understand the Business Impact of EMV Chip Cards 3 What About Mail/Telephone Order and ecommerce? 3 What Is EMV 3 How Chip Cards Work 3 Contactless Technology 4 Background: Behind the Curve 4 Liability

More information

EMV and Small Merchants:

EMV and Small Merchants: September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service

More information

LAYERING SECURITY SOLUTIONS WITH EMV AND TOKENIZATION

LAYERING SECURITY SOLUTIONS WITH EMV AND TOKENIZATION tokenex.com LAYERING SECURITY SOLUTIONS WITH EMV AND TOKENIZATION A TokenEx White Paper White Paper LAYERING SECURITY SOLUTIONS WITH EMV AND TOKENIZATION September 2015 Revision 1.1 EXECUTIVE SUMMARY When

More information

Enterprise Payments for

Enterprise Payments for Enterprise Payments for Table of Contents I. Introducing CardConnect II. III. IV. Gartner Tokenization Reporting Featuring CardConnect PCI Compliance, EMV & True Payment Security CardConnect for SAP V.

More information

EMV in Hotels Observations and Considerations

EMV in Hotels Observations and Considerations EMV in Hotels Observations and Considerations Just in: EMV in the Mail Customer Education: Credit Card companies have already started customer training for the new smart cards. 1 Questions to be Answered

More information

Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance

Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance Payment Security White Paper Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance Breaches happen across all industries as thieves look for vulnerabilities.

More information

Transitions in Payments: PCI Compliance, EMV & True Transactions Security

Transitions in Payments: PCI Compliance, EMV & True Transactions Security Transitions in Payments: PCI Compliance, EMV & True Transactions Security There have been more than 600 million records compromised from approximately 4,000 data breaches since 2005 and those are just

More information

Why Data Security is Critical to Your Brand

Why Data Security is Critical to Your Brand Why Data Security is Critical to Your Brand Why security is critical to your brand Cybercriminals do not discriminate based on industry or business size. Security is expensive. At least, it is if you wait

More information

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP

THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit

More information

Tokenization: FAQs & General Information. www.tsys.com BACKGROUND. GENERAL INFORMATION What is Tokenization?

Tokenization: FAQs & General Information. www.tsys.com BACKGROUND. GENERAL INFORMATION What is Tokenization? FAQ Tokenization: FAQs & General Information BACKGROUND As technology evolves, consumers are increasingly making their purchases online or through mobile devices and digital wallet applications and their

More information

EMV and Encryption + Tokenization: A Layered Approach to Security

EMV and Encryption + Tokenization: A Layered Approach to Security EMV and Encryption + Tokenization: A Layered Approach to Security 2012 First Data Corporation. All trademarks, service marks and trade names referenced in this material are the property of their respective

More information

Tokenizing the Omni-Channel Environment

Tokenizing the Omni-Channel Environment Tokenizing the Omni-Channel Environment August 2014 $ Whitepaper Tokenizing the Omni-Channel Organization Executive Overview Every organization today receives some form of payment from their customers.

More information

Tokenization Amplified XiIntercept. The ultimate PCI DSS cost & scope reduction mechanism

Tokenization Amplified XiIntercept. The ultimate PCI DSS cost & scope reduction mechanism Tokenization Amplified XiIntercept The ultimate PCI DSS cost & scope reduction mechanism Paymetric White Paper Tokenization Amplified XiIntercept 2 Table of Contents Executive Summary 3 PCI DSS 3 The PCI

More information

How To Protect Your Restaurant From A Data Security Breach

How To Protect Your Restaurant From A Data Security Breach NAVIGATING THE PAYMENTS AND SECURITY LANDSCAPE Payment disruptions impacting restaurant owners today An NCR Hospitality white paper Almost every month we hear a news story about another data breach that

More information

EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems

EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems October 2014 EMV and Restaurants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service marks

More information

PAYMENT SECURITY. Best Practices

PAYMENT SECURITY. Best Practices PAYMENT SECURITY Best Practices At VeriFone, the protection of cardholder information is a top priority. To ensure merchants have secure payment solutions for their customers, and to help protect merchants

More information

Revenue Security and Efficiency

Revenue Security and Efficiency Revenue Security and Efficiency Discussion with the Mid-Atlantic Oracle Applications Users Group CardConnect Solution Oracle EBS Validated Application Oracle EBS Validated Application Securing Payment

More information

Credit Card Processing, Point of Sale, ecommerce

Credit Card Processing, Point of Sale, ecommerce Credit Card Processing, Point of Sale, ecommerce Compliance, Self Auditing, and More John Benson Kurt Willey HACKS REGULATIONS Greater Risk for Merchants Topics Compliance Changes Scans Self Audits

More information

Secure Payments Framework Workgroup

Secure Payments Framework Workgroup Secure Payments Framework Workgroup EMV for the US Hospitality Industry Version 1.0 About HTNG Hotel Technology Next Generation (HTNG) is a non-profit association with a mission to foster, through collaboration

More information

OpenEdge Research & Development Group April 2015

OpenEdge Research & Development Group April 2015 2015: Security, Merchant Readiness & the Coming Liability Shift OpenEdge Research & Development Group April 2015 solutions@openedgepay.com openedgepay.com 2015: Security, Merchant Table of Contents The

More information

EMV's Role in reducing Payment Risks: a Multi-Layered Approach

EMV's Role in reducing Payment Risks: a Multi-Layered Approach EMV's Role in reducing Payment Risks: a Multi-Layered Approach April 24, 2013 Agenda EMV Rationale Why is this worth the effort? Guides how we implement it EMV Vulnerability at the POS EMV Impact on CNP

More information

Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER

Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER SHAZAM, Senior Vice President Agenda The Ugly Fraud The Bad EMV? The Good Tokenization and Other Emerging Payment Options

More information

Credit Card Processing Overview

Credit Card Processing Overview CardControl 3.0 Credit Card Processing Overview Overview Credit card processing is a very complex and important system for anyone that sells goods. This guide will hopefully help educate and inform new

More information

Prevention Is Better Than Cure EMV and PCI

Prevention Is Better Than Cure EMV and PCI Prevention Is Better Than Cure EMV and PCI Prevention Is Better Than Cure An independent view on the effectiveness of EMV and PCI in case of large-scale card compromise. Over the past couple of months,

More information

THE ROAD TO U.S. EMV MIGRATION Information and Strategies to Help Your Institution Make the Change

THE ROAD TO U.S. EMV MIGRATION Information and Strategies to Help Your Institution Make the Change THE ROAD TO U.S. EMV MIGRATION Information and Strategies to Help Your Institution Make the Change Advancements in technological capabilities, along with increasing levels of counterfeit fraud, led the

More information

Practically Thinking: What Small Merchants Should Know about EMV

Practically Thinking: What Small Merchants Should Know about EMV Practically Thinking: What Small Merchants Should Know about EMV 1 Practically Thinking: What Small Merchants Should Know About EMV Overview Savvy business owners know that payments are about more than

More information

BREAKING THE CYCLE OF PAYMENT FRAUD WITH LAYERED SECURITY

BREAKING THE CYCLE OF PAYMENT FRAUD WITH LAYERED SECURITY tokenex.com BREAKING THE CYCLE OF PAYMENT FRAUD WITH LAYERED SECURITY Synergy White Paper White Paper BREAKING THE CYCLE OF PAYMENT FRAUD WITH LAYERED SECURITY THREE HORSEMAN OF THE DATA APOCALYPSE: DATA

More information

Apple Pay. Frequently Asked Questions UK Launch

Apple Pay. Frequently Asked Questions UK Launch Apple Pay Frequently Asked Questions UK Launch Version 1.0 2015 First Data Corporation. All Rights Reserved. All trademarks, service marks and trade names referenced in this material are the property of

More information

A RE T HE U.S. CHIP RULES ENOUGH?

A RE T HE U.S. CHIP RULES ENOUGH? August 2015 A RE T HE U.S. CHIP RULES ENOUGH? A longer term view of security and the payments landscape is needed. Abstract: The United States is finally modernizing its card payment systems and confronting

More information

PCI DSS 101 FOR CTOs AND BUSINESS EXECUTIVES

PCI DSS 101 FOR CTOs AND BUSINESS EXECUTIVES PCI DSS 101 FOR CTOs AND BUSINESS EXECUTIVES CUTTING THROUGH THE COMPLEXITY AND CONFUSION Over the years, South African retailers have come under increased pressure to gain PCI DSS (Payment Card Industry

More information

toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard

toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard Table of Contents For more than 40 years, merchants and consumers have used magnetic stripe credit cards and compatible

More information

Fighting Today s Cybercrime

Fighting Today s Cybercrime SECURELY ENABLING BUSINESS Fighting Today s Cybercrime Ongoing PCI Compliance Using Data-Centric Security Technologies HOUSEKEEPING ITEMS All phone lines have been muted for the duration of the webinar.

More information

ACFS PRODUCT FLYER. Its modular architecture allows a tailored integration, with a short time-to-market for different information systems.

ACFS PRODUCT FLYER. Its modular architecture allows a tailored integration, with a short time-to-market for different information systems. PRODUCT FLYER General Routing Financial System is modular software suite designed to support enterprises providing a MOTO Gateway (Mail Order Telephone Order), complete with tokenization, multi-acquiring

More information

Security. Tiffany Trent-Abram VP, Global Product Management. November 6 th, 2015. One Connection - A World of Opportunities

Security. Tiffany Trent-Abram VP, Global Product Management. November 6 th, 2015. One Connection - A World of Opportunities One Connection - A World of Opportunities Security Tiffany Trent-Abram VP, Global Product Management November 6 th, 2015 2015 TNS Inc. All Rights Reserved. Bringing Global Credibility and History TNS Specializes

More information

PCI Security Standards Council

PCI Security Standards Council PCI Security Standards Council Jeremy King, European Director 2013 Why PCI Matters Applying PCI How You Can Participate Agenda 2 Why PCI Matters Applying PCI How You Can Participate Agenda About the PCI

More information

What is EMV? What is different?

What is EMV? What is different? U.S. consumers are receiving new debit and credit cards with embedded chip technology that better stores and protects cardholder information. These new chip cards are part of the new card standard, Europay,

More information

EMV EMV TABLE OF CONTENTS

EMV EMV TABLE OF CONTENTS 2 TABLE OF CONTENTS Intro... 2 Are You Ready?... 3 What Is?... 4 Why?... 5 What Does Mean To Your Business?... 6 Checklist... 8 3 U.S. Merchants 60% are expected to convert to -enabled devices by 2015.

More information

Table of Contents. Overview. What is payment processing? Who s Who. Types of Payment Solutions. Online Transactions. Interchange Process

Table of Contents. Overview. What is payment processing? Who s Who. Types of Payment Solutions. Online Transactions. Interchange Process Overview Credit Card Processing 101 is your go-to handbook for navigating the payments industry. This document provides a quick and thorough understanding on how businesses accept electronic payments,

More information

PCI 3.0 2015 Deadline Are you Complying? Mark Cuneo. CardConnect

PCI 3.0 2015 Deadline Are you Complying? Mark Cuneo. CardConnect PCI 3.0 2015 Deadline Are you Complying? Mark Cuneo CardConnect PCI Compliance is Very Important And Very Exciting Agenda Why Do I Care? Key Changes Guidance Maintaining Inventory Penetration Testing Protect

More information

PCI Compliance for Healthcare

PCI Compliance for Healthcare PCI Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches happening?

More information

EMV FAQs. Contact us at: CS@VancoPayments.com. Visit us online: VancoPayments.com

EMV FAQs. Contact us at: CS@VancoPayments.com. Visit us online: VancoPayments.com EMV FAQs Contact us at: CS@VancoPayments.com Visit us online: VancoPayments.com What are the benefits of EMV cards to merchants and consumers? What is EMV? The acronym EMV stands for an organization formed

More information

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved

More information

Flexible and secure. acceo tender retail. payment solution. tender-retail.acceo.com

Flexible and secure. acceo tender retail. payment solution. tender-retail.acceo.com Flexible and secure payment solution acceo tender retail payment solution tender-retail.acceo.com Take control of your payment transactions ACCEO Tender Retail is a specialized middleware that handles

More information

PCI 3.1 Changes. Jon Bonham, CISA Coalfire System, Inc.

PCI 3.1 Changes. Jon Bonham, CISA Coalfire System, Inc. PCI 3.1 Changes Jon Bonham, CISA Coalfire System, Inc. Agenda Introduction of Coalfire What does this have to do with the business office Changes to version 3.1 EMV P2PE Questions and Answers Contact Information

More information

Payment Card Industry (PCI) Data Security Standard. PCI DSS Applicability in an EMV Environment A Guidance Document Version 1

Payment Card Industry (PCI) Data Security Standard. PCI DSS Applicability in an EMV Environment A Guidance Document Version 1 Payment Card Industry (PCI) Data Security Standard PCI DSS Applicability in an EMV Environment A Guidance Document Version 1 Release date: 5 October 2010 Table of Contents 1 Executive Summary... 3 1.1

More information

Langara College PCI Awareness Training

Langara College PCI Awareness Training Langara College PCI Awareness Training Have you heard of PCI? Due to the increase of credit card fraud and identity theft, major credit card companies like Visa, MasterCard and Amex have formed a security

More information

PROTECTION OF OUR MERCHANTS AND REFERRAL PARTNERS IS OUR FIRST CONCERN

PROTECTION OF OUR MERCHANTS AND REFERRAL PARTNERS IS OUR FIRST CONCERN PCI Q: What is PCI? A: The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements designed to ensure that ALL companies that process, store or transmit credit card information

More information

PREVENTING PAYMENT CARD DATA BREACHES

PREVENTING PAYMENT CARD DATA BREACHES NEW SCIENCE TRANSACTION SECURITY ARTICLE PREVENTING PAYMENT CARD DATA BREACHES DECEMBER 2014 UL.COM/NEWSCIENCE NEW SCIENCE TRANSACTION SECURITY OVERVIEW From research on the latest electronic transaction

More information

U.S. Smart Card Migration: Stripe to EMV Claudia Swendseid, Federal Reserve Bank of Minneapolis Terry Dooley, SHAZAM Kristine Oberg, Elavon

U.S. Smart Card Migration: Stripe to EMV Claudia Swendseid, Federal Reserve Bank of Minneapolis Terry Dooley, SHAZAM Kristine Oberg, Elavon U.S. Smart Card Migration: Stripe to EMV Claudia Swendseid, Federal Reserve Bank of Minneapolis Terry Dooley, SHAZAM Kristine Oberg, Elavon UMACHA Navigating Payments 2014 October 8, 2014 Who We Are Claudia

More information

Apple Pay. Frequently Asked Questions UK

Apple Pay. Frequently Asked Questions UK Apple Pay Frequently Asked Questions UK Version 1.0 (July 2015) First Data Merchant Solutions is a trading name of First Data Europe Limited, a private limited company incorporated in England (company

More information

An Oracle White Paper July 2010 U.S. CARD FRAUD

An Oracle White Paper July 2010 U.S. CARD FRAUD An Oracle White Paper July 2010 U.S. CARD FRAUD Contents Card fraud can be placed into six categories:... 3 2 Card fraud costs the U.S. card payments industry an estimated US$8.6 billion per year. Although

More information

Preparing for EMV chip card acceptance

Preparing for EMV chip card acceptance Preparing for EMV chip card acceptance Ben Brown Vice President, Regional Sales Manager, Wells Fargo Merchant Services Lily Page Vice President, Wholesale ereceivables, Wells Fargo Merchant Services June

More information

Wayne EMV Solutions. Protect your business with a complete EMV Solution inside and out.

Wayne EMV Solutions. Protect your business with a complete EMV Solution inside and out. Wayne EMV Solutions Protect your business with a complete EMV Solution inside and out. The transition to Europay, MasterCard, Visa (EMV) standards: Significantly reduce your risk of payment card fraud

More information

Testimony of Scott Talbott, Sr. V.P. for Government Relations, Electronic Transactions Association (ETA)

Testimony of Scott Talbott, Sr. V.P. for Government Relations, Electronic Transactions Association (ETA) Testimony of Scott Talbott, Sr. V.P. for Government Relations, Electronic Transactions Association (ETA) House Small Business Committee Hearing on the EMV Deadline and What It Means for Small Business

More information

What is Payment Processing?

What is Payment Processing? Payments For Oracle Overview What is Payment Processing? Payments for Oracle is your go-to handbook for understanding payment acceptance technology and security within Oracle E-Business Suite. This document

More information

CardControl. Credit Card Processing 101. Overview. Contents

CardControl. Credit Card Processing 101. Overview. Contents CardControl Credit Card Processing 101 Overview Credit card processing is a very complex and important system for anyone that sells goods. This guide will hopefully help educate and inform new and old

More information

Drive your fraud rates down

Drive your fraud rates down Drive your fraud rates down Drive your fraud rates down To a greater or lesser extent, fraud concerns almost everyone involved in e-business. With margins tight and competition fierce, the prospect of

More information

How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants

How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants 2012 First Data Corporation. All trademarks, service marks and trade names referenced in this material

More information

Healthcare Payment Security Is Your Patient s Card Data Exposed? May 24, 2016

Healthcare Payment Security Is Your Patient s Card Data Exposed? May 24, 2016 Healthcare Payment Security Is Your Patient s Card Data Exposed? May 24, 2016 PRESENTER BIOS Michael Fidler Vice President Elavon Healthcare Payment Solutions Michael D. Fidler is Vice President, Healthcare

More information

Frequently Asked Questions

Frequently Asked Questions PCI Compliance Frequently Asked Questions Table of Content GENERAL INFORMATION... 2 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)...2 Are all merchants and service providers required to comply

More information

ICS Presents: The October 1st 2015 Credit Card Liability Shift: This Impacts Everyone!

ICS Presents: The October 1st 2015 Credit Card Liability Shift: This Impacts Everyone! ICS Presents: The October 1st 2015 Credit Card Liability Shift: This Impacts Everyone! Presenters: Cliff Gray Senior Associate of The Strawhecker Group Jon Bonham CISA, Coalfire The opinions of the contributors

More information

Give Vendors Access to the Data They Need NOT Access to Your Network

Give Vendors Access to the Data They Need NOT Access to Your Network Give Vendors Access to the Data They Need NOT Access to Your Network Acumera AirGap Architecture By the year 2020 just five years from now it is estimated that 25 billion devices will be connected to the

More information

Managing the Costs of Securing Cardholder Data

Managing the Costs of Securing Cardholder Data Payment Security ROI White Paper Managing the Costs of Securing Cardholder Data The costs and complexities related to protecting cardholder data and complying with PCI regulations have become burdensome

More information

PCI and EMV Compliance Checkup

PCI and EMV Compliance Checkup PCI and EMV Compliance Checkup ATM Security Jim Pettitt Director, ATM Security Diebold Incorporated Agenda ATM threats today Top of mind risk PCI Impact on Security U.S. EMV Migration Conclusions / recommendations

More information

The Relationship Between PCI, Encryption and Tokenization: What you need to know

The Relationship Between PCI, Encryption and Tokenization: What you need to know October 2014 The Relationship Between PCI, Encryption and Tokenization: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems,

More information

* Any merchant that has suffered a hack that resulted in an account data compromise may be escalated to a higher validation level.

* Any merchant that has suffered a hack that resulted in an account data compromise may be escalated to a higher validation level. Q: What is PCI? A: The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements designed to ensure that ALL companies that process, store or transmit credit card information maintain

More information

We believe First Data is well positioned to take advantage of all of these trends given the breadth of our solutions and our global operating

We believe First Data is well positioned to take advantage of all of these trends given the breadth of our solutions and our global operating Given recent payment data breaches, clients are increasingly demanding robust security and fraud solutions; and Financial institutions continue to outsource and leverage technology providers given their

More information

Q: What is PCI? Q: To whom does PCI apply? Q: Where can I find the PCI Data Security Standards (PCI DSS)? Q: What are the PCI compliance deadlines?

Q: What is PCI? Q: To whom does PCI apply? Q: Where can I find the PCI Data Security Standards (PCI DSS)? Q: What are the PCI compliance deadlines? Q: What is PCI? A: The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements designed to ensure that ALL companies that process, store or transmit credit card information maintain

More information

ACFS PRODUCT FLYER. Its modular architecture allows a tailored integration, with a short time-to-market for different payment methods.

ACFS PRODUCT FLYER. Its modular architecture allows a tailored integration, with a short time-to-market for different payment methods. PRODUCT FLYER Internet Gateway Financial Systems is a modular software suite designed to support financial institutions and enterprises, providing a single interface for the optimized management of e-commerce

More information

ACFS PRODUCT FLYER. Its modular architecture allows a tailored integration, with a short time-to-market for different payment methods.

ACFS PRODUCT FLYER. Its modular architecture allows a tailored integration, with a short time-to-market for different payment methods. PRODUCT FLYER Internet Gateway Financial Systems is a modular software suite designed to support financial institutions and enterprises, providing a single interface for the optimized management of e-commerce

More information

PCI Risks and Compliance Considerations

PCI Risks and Compliance Considerations PCI Risks and Compliance Considerations July 21, 2015 Stephen Ramminger, Senior Business Operations Manager, ControlScan Jon Uyterlinde, Product Manager, Merchant Services, SVB Agenda 1 2 3 4 5 6 7 8 Introduction

More information

EMV Delivery of Mobile, Parking and Unattended Payments. Elavon

EMV Delivery of Mobile, Parking and Unattended Payments. Elavon EMV Delivery of Mobile, Parking and Unattended Payments Elavon Elavon-At-A-Glance Elavon s primary business model is growth through partnerships; more than 1,500 Financial Institution partners serving

More information

Planning For EMV Technology. Your Guide to Making the Transition

Planning For EMV Technology. Your Guide to Making the Transition Planning For EMV Technology Your Guide to Making the Transition Table of Contents What is EMV? How does it work? Why is it happening? Who will be affected? Is POS terminal replacement necessary? Is this

More information

Frequently Asked Questions

Frequently Asked Questions Contents CISP Program Overview... 2 1. To whom does CISP apply?...2 2. What does VISA define as "cardholder data"?...2 3. What if a merchant or service provider does not store Visa cardholder data?...2

More information

Where Security Fits in the Payments Processing Chain

Where Security Fits in the Payments Processing Chain With over 20 billion credit card purchase transactions in the US in 2009 and a highly complex system for processing those transactions, it s not surprising that credit card information is a key target

More information

The Value of a Payment Gateway. White Paper

The Value of a Payment Gateway. White Paper The Value of a Payment Gateway White Paper The Ever-Evolving Payment Landscape There s no way around it. No matter what size your business is or what industry you work in, if you accept credit cards, keeping

More information

The Adoption of EMV Technology in the U.S. By Dave Ewald Global Industry Sales Consultant Datacard Group

The Adoption of EMV Technology in the U.S. By Dave Ewald Global Industry Sales Consultant Datacard Group The Adoption of EMV Technology in the U.S. By Dave Ewald Global Industry Sales Consultant Datacard Group Abstract: Visa Inc. and MasterCard recently announced plans to accelerate chip migration in the

More information

Merchants & PCI DSS Obse b r se vat va io i n o s n f s rom o a a P a P ym a en e t n Gat a ew e a w y a pe p r e spe sp ct e ive i

Merchants & PCI DSS Obse b r se vat va io i n o s n f s rom o a a P a P ym a en e t n Gat a ew e a w y a pe p r e spe sp ct e ive i Merchants & PCI DSS Observations from a Payment Gateway perspective It has the words DON'T PANIC inscribed in large friendly letters on its cover Who are you?? 17 years in the Irish & European Acquiring

More information

Optimizing the Payment Process in SAP

Optimizing the Payment Process in SAP Optimizing the Payment Process in SAP As a company, your goal is to serve your customers effectively, efficiently generating sales and collecting revenue. The nature of the sale and payment can take many

More information

PCI Solution for Retail: Addressing Compliance and Security Best Practices

PCI Solution for Retail: Addressing Compliance and Security Best Practices PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Standard Attestation of Compliance for Self-Assessment Questionnaire D Service Providers Version 3.1 April 2015 Section 1: Assessment Information Instructions for Submission

More information

A Brand New Checkout Experience

A Brand New Checkout Experience A Brand New Checkout Experience EMV Transformation EMV technology is transforming the U.S. payment industry, bringing a whole new experience to the checkout counter. Introduction What is EMV? It s 3 small

More information

A Brand New Checkout Experience

A Brand New Checkout Experience A Brand New Checkout Experience EMV Transformation EMV technology is transforming the U.S. payment industry, bringing a whole new experience to the checkout counter. Introduction What is EMV? It s 3 small

More information

Encryption and Tokenization: Protecting Customer Data. Your Payments Universally Amplified. Tia D. Ilori Sue Zloth September 18, 2013

Encryption and Tokenization: Protecting Customer Data. Your Payments Universally Amplified. Tia D. Ilori Sue Zloth September 18, 2013 Encryption and Tokenization: Protecting Customer Data Your Payments Universally Amplified Tia D. Ilori Sue Zloth September 18, 2013 Agenda Global Threat Landscape Real Cost of a Data Breach Evolution of

More information

PAYWARE MERCHANT MANAGED SERVICE

PAYWARE MERCHANT MANAGED SERVICE PAYWARE MERCHANT MANAGED SERVICE PAYware MerchanT Managed Service We focus on payments, so you can drive sales Whether you re selling goods or services, managing your own internal high volume payments

More information

OpenEdge Research & Development Group April 2015

OpenEdge Research & Development Group April 2015 2015: Development, Merchant Readiness & the Coming Liability Shift OpenEdge Research & Development Group April 2015 developers@openedgepay.com openedgepay.com 2015: Development, Merchant Table of Contents

More information

U.S. House Small Business Committee. On Behalf of the National Grocers Association. October 6, 2015

U.S. House Small Business Committee. On Behalf of the National Grocers Association. October 6, 2015 U.S. House Small Business Committee On Behalf of the National Grocers Association October 6, 2015 The National Grocers Association (NGA) appreciates the opportunity to submit comments for the record to

More information

Data Security Basics for Small Merchants

Data Security Basics for Small Merchants Data Security Basics for Small Merchants 28 October 2015 Stan Hui Director, Merchant Risk Lester Chan Director, Merchant Risk Disclaimer The information or recommendations contained herein are provided

More information

White Paper Solutions For Hospitality

White Paper Solutions For Hospitality White Paper Solutions For Hospitality Foreword Addressing the complexity of a hospitality ecosystem as varied as the front desk to the parking garage, to the restaurant, the website, and the call center,

More information

Euronet s EMV Chip Solutions Superior Protection with Enhanced Security against Fraud

Euronet s EMV Chip Solutions Superior Protection with Enhanced Security against Fraud Serving millions of people worldwide with electronic payment convenience. Euronet s EMV Chip Solutions Superior Protection with Enhanced Security against Fraud Copyright 2011 Euronet Worldwide, Inc. All

More information

What Merchants Need to Know About EMV

What Merchants Need to Know About EMV Effective November 1, 2014 1. What is EMV? EMV is the global standard for card present payment processing technology and it s coming to the U.S. EMV uses an embedded chip in the card that holds all the

More information

PCI Compliance Overview

PCI Compliance Overview PCI Compliance Overview 1 PCI DSS Payment Card Industry Data Security Standard Standard that is applied to: Merchants Service Providers (Banks, Third party vendors, gateways) Systems (Hardware, software)

More information

PCI Compliance Are you at Risk? September 17, 2014 Dan Garrett/Matt Fluegge Vantiv

PCI Compliance Are you at Risk? September 17, 2014 Dan Garrett/Matt Fluegge Vantiv PCI Compliance Are you at Risk? September 17, 2014 Dan Garrett/Matt Fluegge Vantiv Security Challenges Desirability of Data 80% of all data breaches is payment card data (Verizon RISK team assessment)

More information

Small Merchant Data Security Survey Results

Small Merchant Data Security Survey Results Small Merchant Data Security Survey Results January 2011 Conducted by: First Data and National Retail Federation 1 Executive Summary 3 Table of Contents Detailed Findings 6 Knowledge & Awareness of Data

More information

Payment Security Solutions. Payment Tokenisation. Secure payment data storage and processing, while maintaining reliable, seamless transactions

Payment Security Solutions. Payment Tokenisation. Secure payment data storage and processing, while maintaining reliable, seamless transactions Payment Security Solutions Payment Tokenisation Secure payment data storage and processing, while maintaining reliable, seamless transactions 02 Payment Security Solutions CyberSource Payment Tokenisation:

More information

E2EE and PCI Compliancy. Martin Holloway VSP Sales Director VeriFone NEMEA

E2EE and PCI Compliancy. Martin Holloway VSP Sales Director VeriFone NEMEA E2EE and PCI Compliancy Martin Holloway VSP Sales Director VeriFone NEMEA Security Breaches In The News 2 Security Breaches In The News 3 Security Breaches In The News 4 Security Breaches In The News 5

More information

Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014

Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014 Are You Ready For PCI v 3.0 Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014 Today s Presenter Corbin Del Carlo QSA, PA QSA Director, National Leader PCI Services Practice 847.413.6319

More information

The Cost of Compliance

The Cost of Compliance The Cost of Compliance The Payment Card Industry Data Security Standard (PCI DSS) aims to protect sensitive cardholder data throughout the life cycle of ecommerce transactions. The standard puts heavy

More information