rguest Pay Gateway: A Solution Review



Similar documents
White Paper PCI-Validated Point-to-Point Encryption

White Paper PCI-Validated Point-to-Point Encryption On Microsoft Azure. By Christopher Kronenthal, Chief Technology Officer

White Paper Solutions For Hospitality

Solutions For Higher Education: Reducing Compliance Scope Across Campus With PCI Validated P2PE

Point-to-Point Encryption (P2PE)

Increase Efficiency, Maximize Profits, and Secure Guest Confidence.

Payment Card Industry (PCI) Point-to-Point Encryption

Initial Roadmap: Point-to-Point Encryption Technology and PCI DSS Compliance

LASTING CONNECTIONS. Best-in-class professional services for the hospitality industry. TRANSFORMING HOSPITALITY BY BUILDING

Point-to-Point Encryption

Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective

Tokenization Amplified XiIntercept. The ultimate PCI DSS cost & scope reduction mechanism

Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance

PCI Compliance The Road Ahead. October 2012 Hari Shah & Parthiv Sheth

Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014

PCI P2PE 2.0. What Does it Mean for Merchants and Processors? September 10, 2015

SELLING PAYMENT SYSTEMS SERVICES & SOLUTIONS

Increase Efficiency, Maximize Profits, and Secure Guest Confidence.

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire P2PE-HW and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

INFORMATION TECHNOLOGY FLASH REPORT

What s New in PCI DSS Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1

Adyen PCI DSS 3.0 Compliance Guide

PCI DSS 3.0 Overview. OSU Business Affairs Business Affairs PIT Crew - Project, Improvement, & Technology Robin Whitlock

VeriFone VeriShield Total Protect Technical Assessment White Paper

Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance

PCI Compliance. Crissy Sampier, Longwood University Edward Ko, CampusGuard

PCI PA-DSS Requirements. For hardware vendors

Payment Card Industry (PCI) Point-to-Point Encryption

PCI Compliance Overview

The State of Security and Compliance for E- Commerce and Retail

The Relationship Between PCI, Encryption and Tokenization: What you need to know

PCI DSS. CollectorSolutions, Incorporated

Agilysys rguest Analyze Solution

PCI Compliance 3.1. About Us

PCI DSS 101 FOR CTOs AND BUSINESS EXECUTIVES

Frequently Asked Questions

Fighting Today s Cybercrime

Secure Payments Framework Workgroup

We believe First Data is well positioned to take advantage of all of these trends given the breadth of our solutions and our global operating

Becoming PCI Compliant

To ensure independence, PSC does not represent, resell or receive commissions from any third party hardware, software or solutions vendors.

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance

PCI DSS v3.0 SAQ Eligibility

TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No MERCHANT DEBIT AND CREDIT CARD RECEIPTS

Accelerating PCI Compliance

How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants

Understanding the Value of Tokens

E2EE and PCI Compliancy. Martin Holloway VSP Sales Director VeriFone NEMEA

PCI Security Standards Council

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance

PCI Security as a Lifecycle: How to Plan for PCI in 2012 and Beyond

Reducing PCI DSS Scope with the TransArmor First Data TransArmor Solution

Payment Card Industry Standard - Symantec Services

Case 2:13-cv ES-JAD Document Filed 12/09/15 Page 1 of 116 PageID: Appendix A

mobile payment acceptance Solutions Visa security best practices version 3.0

Data Security Basics for Small Merchants

Transitions in Payments: PCI Compliance, EMV & True Transactions Security

University Policy Accepting Credit Cards to Conduct University Business

Technology Innovation Programme

PCI DSS Compliance Information Pack for Merchants

Save paper, save trees, save storage, save money.

global leader in seamless payment

Josiah Wilkinson Internal Security Assessor. Nationwide

Payment Card Industry (PCI) Data Security Standard

Healthcare Payment Security Is Your Patient s Card Data Exposed? May 24, 2016

Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review

MPOS: RISK AND SECURITY

Enterprise Payments for

Target Security Breach

PCI Data Security Standards

Point Secure Commerce Application (SCA) 2.x PCI PA-DSS Out of Scope White Paper

Gain control over your operations.

How To Protect Your Credit Card Information From Being Stolen

North Carolina Office of the State Controller Technology Meeting

LASTING CONNECTIONS TRANSFORMING GAMING BY BUILDING

PCI Compliance. Top 10 Questions & Answers

PCI DSS Compliance Services January 2016

Corbin Del Carlo Director, National Leader PCI Services. October 5, 2015

PCI Compliance. How to Meet Payment Card Industry Compliance Standards. May cliftonlarsonallen.com CliftonLarsonAllen LLP

Revenue Security and Efficiency

A HOLISTIC APPROACH TO MERCHANT PAYMENT SECURITY. 2016, Vantiv, LLC. All rights reserved.

5 TIPS TO PAY LESS FOR PCI COMPLIANCE

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009

Managing the Costs of Securing Cardholder Data

Flexible and secure. acceo tender retail. payment solution. tender-retail.acceo.com

PCI 3.1 Changes. Jon Bonham, CISA Coalfire System, Inc.

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

Office of Finance and Treasury

How To Protect Visa Account Information

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

Security & Encryption in Healthcare Payments PCI DSS Technical Assessment White Paper

Mobile Payments Applications and Challenges Jose Diaz Director, Business Development & Technical Alliances Thales e-security

Mobile Device Payment Card Processing: How Secure is It? Richard Poworski CISSP, ISP, ITCP, SCF, PCI QSA, PCIP Managing Consultant

What Data Thieves Don t Want You to Know: The Facts About Encryption and Tokenization

Thoughts on PCI DSS 3.0. D. Timothy Hartzell CISSP, CISM, QSA, PA-QSA Associate Director

PCI Compliance. What is New in Payment Card Industry Compliance Standards. October cliftonlarsonallen.com CliftonLarsonAllen LLP

Introduction to PCI DSS Compliance. May 18, :15 p.m. 2:15 p.m.

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Transcription:

rguest Pay Gateway: A Solution Review

TABLE OF CONTENTS Introduction...3 Why P2PE?...4 PCI P2PE Standards...4 Buyer Beware...6 PCI DSS Scope Reduction...6 P2PE Payment Terminals...7 The Payment Information Proxy (PIP)...8 Conclusion...8

INTRODUCTION Merchants today navigate an evolving payments landscape riddled with technology challenges, false statements about security and an increasing regularity of data theft. rguest Pay Gateway addresses these challenges, offering the hospitality industry s first, PCI-validated, point-to-point encrypted (P2PE) payment gateway that meets the security needs of merchants everywhere. The Payment Card Industry (PCI) Security Standards Council develops the standards by which payments are securely processed. The P2PE standard, the PCI Council s newest standard, meticulously defines the rigorous requirements a payment solution provider must adhere to, enabling merchants to securely process payments and keep their network environment out of scope for traditional PCI security assessments. There are many providers who claim to leverage secure technology for payment transactions and claim to offer PCI scope reduction; however, many of these providers have limits to the amount of security their solutions actually provide. Some, for instance, do not provide 100% hardware-based encryption something that disqualifies the solution from ever being PCI-Validated. Only when the solution is clearly listed on the PCI Council s site as a certified provider can merchants have confidence that their data is processed via the most advanced technology and security. This significantly reduces the merchant s risk of data breach and the costly burden of PCI assessments. If the provider is not listed on the PCI Council s site, merchants are at greater risk. The Agilysys rguest Pay Gateway P2PE solution powered by FreedomPay is PCIand P2PE-certified. rguest Pay leverages the only gateway solution in North America that is P2PE PCI-validated and also supports EMV, tokenization and a Payment Information Proxy for e-commerce transactions. This solution easily integrates into several of today s Point-of-Sale (POS) systems, property management systems and payment processors. With the coveted PCI validation, merchants employing rguest Pay have the opportunity to reduce their scope of PCI compliance requirements and can conduct business with the confidence that no unencrypted cardholder data flows through their systems. This document explores the merchant benefits of PCI-Validated P2PE, the process by which the underlying FreedomPay solution earned PCI validation, and the valuable advantages of the rguest Pay Gateway platform. Agilysys rguest Pay Gateway P2PE solution - powered by FreedomPay - is fully validated by the PCI Council. Agilysys, Inc. LASTING CONNECTIONS 3

Why P2PE? Merchants face an increasing number of challenges related to payments: ensuring security, maintaining compliance, managing costs and keeping pace with an everchanging payments technology landscape, to name just a few. Emerging standards, like the 2015 switch to EMV and digital wallet products from Apple, Google, PayPal and even Starbucks, have disrupted the payment landscape and sent merchants scrambling for solutions. The stakes are high. For many merchants, a growing threat of cyber crime and malware has placed security at the top of the priority list. In today s hospitality environment, preventing a data breach and keeping guest data secure is a need that cannot be ignored. To complicate matters, the solution marketplace is rife with misinformation and biased opinions. The PCI Council has created and published a standard against which to validate payment solutions. In doing so, the payments industry has established a very clear, incontrovertible technology standard that, when followed, secures a merchant s payment processing and infrastructure. With PCI-validated P2PE, transactions are entirely encrypted before they even enter the merchant s environment, essentially removing cardholder data from the merchant s POS and network. Point-to-point encryption (P2PE) delivers two critically important benefits to merchants: P2PE offers the greatest possible security for guest payment information, thus protecting merchants from damaging data breaches. Payment solutions featuring PCI-validated P2PE allow merchants to greatly reduce their PCI DSS compliance burden. rguest Pay Gateway, powered by FreedomPay s P2PE solution, earned PCI P2PE validation in 2014. It offers merchants unparalleled payment security and functionality and further protects that investment with EMV support. This foresight is setting the pace for the entire payments industry. Moreover, merchants who use rguest Pay Gateway benefit from a reduced annual assessment report that requires only 19 quick controls instead of the standard 284 documentation requirements. How P2PE encryption works: 1. Data is entered into the payment terminal. 2. Before the data is stored/transmitted, it is transformed into unreadable code. 3. Only with a special key does the data become readable once again. $225,000+ 1 Average annual costs of a PCI audit $3.5MM+ 2 Average cost of a data breach PCI P2PE Standards In 2012 and 2013, the PCI Security Standards Council released the PCI P2PE Standard: a set of controls aimed at providing clarity and definition around point-topoint encryption. 1 PCI DSS Trends 2010 QSA Insights Report. Ponemon Institute Research Report. March 2010 2 2014 Cost of a Data Breach Study: Global Analysis. Ponemon Institute Research Report. May 2014. Agilysys, Inc. LASTING CONNECTIONS 4

There are three core principles underlying PCI-Validated solutions: Hardware to hardware encryption and decryption with a POI (point-of-interaction) device that has SRED (Secure Reading and Exchange of Data) listed as a function and enabled. Certified to have a validated, secure distribution channel. This means the entire chain of custody of the POI devices follow strict controls regarding shipping, receiving, tamper-evident packaging and installation. P2PE Instruction Manual (PIM) that guides the merchant on POI device use, storage, return for repairs and regular PCI reporting. Merchants who implement PCI-Validated P2PE solutions that adhere to the secure principles gain an important advantage: a reduction in the scope of their PCI assessments. As stated on the PCI Security Standards Council s FAQ web page: Only Council-listed solutions are recognized as meeting the requirements necessary for merchants to reduce the scope of their cardholder data environment (CDE) through use of a P2PE solution. - PCI Security Standards Council To earn validation, P2PE solution providers must ensure their solutions satisfy all requirements of the P2PE standard. As a requirement for the P2PE solution assessment, the solution provider must supply the P2PE assessor with all required documentation, software, access to facilities and access to third-party service providers used in connection with the P2PE solution. The PCI P2PE standard encompasses nearly 1,000 individual controls governing encryption and decryption methodologies, software applications, device management and operations related to distribution and cryptographic key injection facilities. To summarize the onerous P2PE assessment process, solutions must be able to account for: Encryption Device Management: Secure Cryptographic Devices (SCDs) provide tamper resistance and detection, as well as response features to help prevent successful attacks involving penetration, monitoring, manipulation, modification or substitution of the devices to recover protected data. Application Security: The application must not transmit or store clear-text primary account numbers (PANs) or sensitive authentication data (SAD) outside the device, and must only use communication methods included in the scope of the PCI-approved POI device evaluation. Encryption Environment: The solution provider must maintain inventory control and monitoring procedures to accurately track POI devices in their possession and provide related instructions to merchants (P2PE Instruction Manual). Decryption Environment Device Management: Documented procedures must exist and be demonstrably in use to ensure the security and integrity of decryption devices as they are placed into service, initialized, deployed, used and decommissioned. P2PE Cryptographic Key Operations: Key management, cryptographic algorithms and cryptographic key lengths must be consistent with international and/or regional standards. Key components must be protected at all times during transmission, conveyance and movement between locations. Agilysys partners with FreedomPay, Ingenico and ScanSource to deliver all facets of the P2PE solution. Ingenico Group s best-in-class hardware and ScanSource s secure distribution and key injection capabilities are meticulously vetted as part of FreedomPay s complete PCI P2PE assessment process. Only Councillisted solutions are recognized as meeting the requirements necessary for merchants to reduce the scope of their cardholder data environment (CDE) through use of a P2PE solution. PCI Security Standards Council Response to FAQ 1162 Agilysys, Inc. LASTING CONNECTIONS 5

Buyer Beware Many vendors in the payments industry claim to offer P2PE, usually bundled with a POS system and/or payment terminal and/or payment gateway. However, merchants must be cautious about false claims and misstatements. Any P2PE solution that does not adhere to the stated PCI requirements and is not listed by the PCI Security Council as validated P2PE will not exclude the merchant s POS and supporting network from compliance requirements. It is incumbent on merchants to work with their Qualified Security Assessor (QSA) on vetting fact from fiction. There are a number of vendors making claims that simply cannot hold up to the explicit facts as stated by the PCI Council. Only PCI-Validated P2PE solutions have been thoroughly audited and evaluated, delivering the highly preferred benefits of security assurance and true scope reduction. PCI DSS Scope Reduction PCI compliance validation has grown to become a burdensome and costly process for large and small merchants alike. Its complexity is evident in the PCI DSS Self-Assessment Questionnaire (SAQ). The SAQ is a validation tool intended to assist merchants and service providers who are permitted by the payment brands to self-evaluate their compliance with PCI DSS. With 284 individual, complex controls to document and maintain, PCI DSS compliance has historically required merchants to invest significant time and resources each year. Employing a PCI-Validated P2PE solution offers merchants significant reductions in scope for PCI DSS compliance. Because all clear-text cardholder data are removed from the merchant s POS and network environment, that infrastructure is no longer subject to an extensive PCI compliance documentation process. Merchants who employ a PCI-validated P2PE solution will notice a reduction in the documentation necessary as well as a reduction in the underlying costs of maintaining a less secure environment. At only 19 questions, SAQ P2PE-HW is a substantially shorter compliance document available only to merchants who process cardholder data via approved payment terminals as part of a Council-listed P2PE solution. To be eligible for the SAQ P2PE-HW, merchants must confirm that they: Exclusively use a PCI P2PE solution listed on the PCI SSC s List of Validated P2PE Solutions. Do not store, process or transmit any cardholder data on any system or electronic media (for example, on computers, portable disk or audio recordings) outside the payment terminal used as part of the Council-listed P2PE solution. Do not store any cardholder data in electronic format. This includes verification that there is no legacy storage of cardholder data from other payment devices or systems. Have implemented all controls in the P2PE Instruction Manual (PIM) provided by the P2PE Solution Provider. With substantially fewer requirements to complete, largely related to the proper maintenance and implementation of the P2PE payment terminal, SAQ P2PE-HW removes the core elements of the merchant environment from scope: the POS, operating system and network. As an added benefit, penetration tests and vulnerability scans are no longer required. This enables POS devices and operating systems that would otherwise fall out of compliance to remain in use because the P2PE payment terminal circumvents that infrastructure, and no cardholder data flows through legacy systems. Official PCI Validation for a P2PE solution means that merchants can significantly reduce their scope for PCI DSS validation and obtain third- party assurance that no cardholder data passes through their network environment in an unencrypted state. Matt Getzelman, National PCI Practice Director, Coalfire Systems, Inc. Agilysys, Inc. LASTING CONNECTIONS 6

P2PE Payment Terminals Core to the PCI-validated P2PE solution is the Secure Reading and Exchange of Data (SRED) module, designed to encrypt data at the Point-of-Interaction. The SRED module applies the security and cryptographic protection of PIN data to the reading of card data presented by magnetic stripe, EMV, contactless/nfc and manual entry. As Rob Martin, Vice President of Security Solutions for Ingenico Group explains, In order for P2PE to be in the SRED module, the encryption key management and encryption of the cardholder data must be done in the device s security processor. This and other P2PE program aspects must be in firmware, as opposed to being in the application. The firmware is reviewed and certified as meeting the SRED requirements by a PCI approved laboratory. The rguest Pay solution leverages SRED-enabled terminals from Ingencio Group, offering merchants flexibility to roll out a variety of compliant devices. All Ingenico devices provide support with traditional magnetic stripe payments in addition to alternative and emerging payment methodologies such as EMV and NFC. Partnering with Ingenico, Agilysys offers a diverse portfolio of payment devices to meet the specific needs of hospitality businesses. rguest Pay supports a wide variety of PCI P2PE payment device options for every use-case, including countertop, pay-at-table, EMV, mobile tablet and signature capture scenarios. The Payment Information Proxy (PIP) In complex enterprises common to the hospitality industry, even the security offered through SRED-compliant payment terminals and validated P2PE may still be insufficient to secure all of a merchant s payment channels. Cardholder data collected via e-commerce interfaces from online travel agents must also be protected. rguest Pay Gateway s Payment Information Proxy (PIP) secures these e-commerce transactions. Based on the HTNG Secure Payments Framework, the PIP intercepts e-commerce messages containing card data and replaces the sensitive data with a unique token. Therefore, merchants systems remain secured and infrastructures remain out of PCI scope. How the Payment Information Proxy (PIP) Works: 1. Guest enters card data into a 3rd-Party OTA website. 2. OTA sends request not to PMS, but rather to the rguest PIP 3. PIP extracts card data from message and replaces it with a token. 4. Sanitized message is forwarded to your PMS Only a PCI-validated, P2PE payment terminal circumvents the pointof-sale system and network. Agilysys, Inc. LASTING CONNECTIONS 7

CONCLUSION rguest Pay Gateway is purpose-built for the complex merchant environments prevalent throughout the hospitality industry. With unparalleled security as a core requirement, rguest Pay offers official PCI-P2PE validation, allowing Agilysys to offer PCI cost and scope reduction that other providers cannot. And by layering tokenization and the Payments Information Proxy atop our strong P2PE platform, merchants are assured to be protected across all business channels. Additionally, rguest Pay delivers robust connectivity to all major U.S. credit card processors. It also supports a wide variety of PCI P2PE payment devices. As the payment landscape shifts to include EMV and NFC transactions, rguest Pay enables merchants to stay ahead of the game. Using North America s first fullyfunctional PCI-Validated P2PE platform with EMV and NFC-ready terminals, rguest Pay sets the standard for merchants to deliver an enhanced guest experience based on security, functionality and superior technological intelligence. Merchant Merchant s POS stores token for settlement and send approve/decline message to terminal Secure Ingenico payment terminal encrypts cardholder data at the point of interaction Powered by: rguest Pay sends the authorization message back to the merchant with the tokenized cardholder data rguest Pay rguest Pay rguest Pay hardware security module decrypts the data and sends it for processing Cardholder data is authorized by the processor and returned to rguest Pay Processor About Coalfire Coalfire is the global technology leader in cyber risk management and compliance services for enterprises and government organizations. Coalfire s professionals are renowned for their technical expertise and unbiased assessments and recommendations. Coalfire s approach builds on successful, long-term relationships with clients to achieve multiple compliance objectives tied to a long-term strategy to prevent security breaches and data theft. About Ingenico Group Ingenico Group is the global leader in seamless payment, providing smart, trusted and secure solutions to empower commerce across all channels, in-store, online and mobile. With the world s largest payment acceptance network, Ingenico delivers secure payment solutions with a local, national and international scope. Ingenico is the trusted world-class partner for financial institutions and retailers, from small merchants to several of the world s best known global brands. Their solutions enable merchants to simplify payment and deliver their brand promise. By identifying the important differences in today s payment gateway offerings a merchant can make the most informed decision and secure all cardholder data. Agilysys, Inc. LASTING CONNECTIONS 8

About FreedomPay FreedomPay is the engine inside the world s expanding and interconnected ecosystem of commerce. FreedomPay makes payments smarter, simpler and more secure. The FreedomPay Commerce Platform is a multi-patented solution portfolio designed to enable companies to embrace current trends and accelerate innovation. The platform seamlessly bridges the gap across in-store, web and mobile by interconnecting POS systems, transaction processors, incentive engines and other disparate systems to a cutting edge payment gateway. The FreedomPay Commerce Platform P2PE solution provides merchants complete payment data security, including EMV and NFC compliance, in accordance with the coveted certification from the PCI Security Standards Council. With unparalleled security as a core requirement, rguest Pay offers official PCI-P2PE validation, allowing Agilysys to offer PCI cost and scope reduction that other providers cannot. Agilysys, Inc. LASTING CONNECTIONS 9

About Agilysys Agilysys is a leading developer and marketer of software-enabled solutions and services to the hospitality industry. The company specializes in next-generation point-of-sale, property management, inventory and procurement, workforce management, analytics, document management and mobile and wireless solutions. These solutions are designed to streamline operations, improve efficiency, increase guest recruitment and wallet share, enhance the guest experience and maximize revenue potential. Agilysys operates extensively throughout North America, Europe and Asia, with corporate services located in Alpharetta, GA, and offices in Singapore, Hong Kong and Malaysia. For more information, visit www.agilysys.com. Copyright 2015 by Agilysys, Inc. All rights reserved. Neither this document nor any portion of the contents of this document may be reproduced or transmitted in any form or by any means without the prior written permission of Agilysys, Inc. This document may be changed at any time without notice. This document contains confidential information of Agilysys, Inc. which may not be used or further disclosed without the prior written permission of Agilysys, Inc. All trademarks, and registered trademarks are the property of their respective owners.