TransArmorSM A Secure Transaction ManagementSM Solution

Slides:



Advertisements
Similar presentations
PCI DSS for Retail Industry
Advertisements

HCE AND BLE UNIVERSITY TOMORROWS TRANSACTIONS LONDON, 20 TH MARCH 2014.
ANSI X9.119 Part 2: Using Tokenization Methods
PCI-DSS Erin Benedictson Information Security Analyst AAA Oregon/Idaho.
This refresher course will:
ETA UNIVERSITY MARCH 19, 2015 Deana Rich R ICH C ONSULTING, I NC. Edward A. Marshall A RNALL G OLDEN G REGORY LLP Payments 101: Overview of the Payments.
Trends in Card Processing North Carolina Ecommerce Conference
Protecting Your Customers’ Card Data ASTRA Presentation Brian Chapman and Peter O’Rourke.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
1 Credit card operation and the recent CardSystems incident HONG KONG MONETARY AUTHORITY 4 July 2005.
Credit Card Compliance Regulations Mandated by the Payment Card Industry Standards Council Accounting and Financial Services.
CLXMGCS.ppt Why Smart Cards System Overview Card Architecture Why CardLogix Smart Cards Overview FY 2001.
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Government Databases and You or How I Learned to Stop Worrying and Love Information Loss. By Patrick Fahey Mis 304.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Geneva, Switzerland, 4 December 2014 Evolving Payments into The Digital World Richard Smith, Vice President, MasterCard Customer Fraud Management
Why Comply with PCI Security Standards?
Payment Card Industry (PCI) Data Security Standards (DSS) Fundamentals
“Electronic Payment System”
Travillon Consultants
Payments technology and security
SOA Landscape Recommendations By >. Who we are  Team Members  Company History  Current & Past Client Projects  Note: have fun here. Make up your history.
The influence of PCI upon retail payment design and architectures Ian White QSA Head of UK&I and ME PCI Team September 4, 2013 Weekend Conference 7 & 8.
CertAnon The feasibility of an anonymous WAN authentication service Red Group CS410 March 1, 2007.
Secure Electronic Transaction (SET)
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
© 2014 CustomerXPs Software Pvt Ltd | | Confidential 1 Tentacles of Fraud #StarfishBanks CustomerXPs Software Private Limited.
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
E-commerce What are the relationships among: – Client (i.e. you) – Server – Bank – Certification authority Other things to consider: – How to set up your.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Fraud and Risk in the Electronic Payment Space Michelle Marshall-Thompson VP, Fraud/Risk Officer FirstMerit Merchant Bankcard.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
What you need to know about PCI-DSS Jane Drews Chief Information Security Officer Information Security & Policy Office
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
Security A Payments Perspective Terry Dooley EVP & CIO SHAZAM Network.
Langara College PCI Awareness Training
PCI-DSS: Guidelines & Procedures When Working With Sensitive Data.
Midsouth User Group Annual Conference
VeriShield Protect Revolutionary technology that simplifies PCI DSS compliance with no system upgrades Now available on V x Solutions!
INTRODUCTION TO SIM.DLL AGENDA SIM.DLL Overview and Features SIM.DLL Requirements Supported Terminals Transaction Flow Benefits.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
ENABLING A COST/ BENEFIT ANALYSIS OF IMPLEMENTING ENCRYPTION- AT-REST USING FAIR CASE STUDY SHARED COURTESY OF RISKLENS CONFIDENTIAL - FAIR INSTITUTE 2016.
COST BENEFITS OF IMPLEMENTING CREDIT CARD DATABASE TOKENIZATION USING FAIR CASE STUDY SHARED COURTESY OF RISKLENS CONFIDENTIAL - FAIR INSTITUTE
Statewide Electronic Commerce Program North Carolina Office of the State Controller March 2016 Fayetteville Fort Bragg.
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
Security Policy and Key Management Centrally Manage Encryption Keys - Oracle TDE, SQL Server TDE and Vormetric. Tina Stewart, Vice President.
Copyright 2009, First Data Corporation. All Rights Reserved. How Does TransArmor SM Work at the POS? SafeProxy Merchant Anti FraudAnalytics First Data.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
A Brief Introduction Radiant Pay, a global provider of payment processing services to all kinds of business, Radiant Pay Services.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
PCI COMPLIANCE & A/R AUTOMATION 101 Nodus Technologies, Inc.
MARTA’s Road to PCI Compliance
Decrypting Tokenization What is it and why is it important?
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
EMV & Parking – 6 Months On
Secure Electronic Transaction
Information Security: Risk Management or Business Enablement?
MARTA’s Road to PCI Compliance
Secure Electronic Transaction (SET) University of Windsor
Payment & Settlement System Developments
Forensic and Investigative Accounting
Protect data in core business applications
STEALTHbits Technologies, Inc.
Presentation transcript:

TransArmorSM A Secure Transaction ManagementSM Solution Overview March 2010

Impact of Credit Card Fraud More than 280 million payment card records were breached in 2008 alone1 Merchants have collectively spent more than $1B on PCI-DSS compliance as part of their security systems2 The value of credit card numbers make them the most targeted information for theft1 The average cost of coping with a data breach in 2008 rose to $6.6 million—a 40 percent increase since 20063 1 Verizon, 2009 Data Breach Investigations Report, Verizon Business RISK Team, 2009 2 Letter to Bob Russo of the PCI Security Standards Council from the National Retail Federation, et. al., June 9, 2009. 3 Ponemon Institute, 2008 Annual Study: Cost of a Data Breach, February 2009

Merchant Fraud Problems and Costs Merchant-based vulnerabilities appear at almost any point in the card processing environment – in transit, at rest, in use Merchants take on significant risk by collecting and managing credit card data for business and marketing purposes. Costs associated with an incident are unexpected and unknown until something happens, putting Merchants at further financial risk Upfront costs to protect against vulnerabilities and meet PCI standards have escalated rapidly over the past few years Credit card numbers exist in too many places putting merchants at risk

Solving the Card Data Problem Reduce the number of places where card data exists Point-of Sale systems CRM systems MIS databases / reports Remove the burden of protecting payment card data from the merchant Reduce the Card Data Environment and PCI compliance efforts 2008 was a record year for number of records compromised: 285 million. Just three industries—Retail, Financial Services and Food and Beverage—accounted for three-quarters of the 2008 breaches. 99.9 percent of the records were compromised from servers and applications. As a percentage of caseload for the Verizon Business RISK Team, payment card breaches remain near the 80 percent mark and far outnumber the other data types. They consume 98 percent of all records compromised in 2008. Fraudulent use of stolen card data was confirmed in 83 percent of Verizon’s cases. 91 percent of all compromised records were linked to organized criminal groups. In 66 percent of the cases, the breach involved data that the organization didn’t even know was on the system. TransArmorSM, a Secure Transaction ManagementSM Solution

Introducing TransArmorSM The First Data® TransArmorSM solution moves the burden of protecting payment card data from the merchant to First Data using a multi-level defense Combines encryption and tokenization to protect data at every processing stage Complimentary to Card Authentication technologies Removes payment card information from the merchant completely by replacing the Permanent Account Number (PAN) with a ‘Token’ Maintains all the merchant’s business benefits of storing the payment card data without the associated risk Warrants the Token against compromise and fraudulent use

How it Works Merchant Environment First Data Datacenter SafeProxy 3 1 First Data Switch Issuer 2 Encryption 4 5 Financial Token 1. Credit Card is swiped at the merchant’s POS 2. PAN/Track data/exp dates encrypted using a Public Key in the POS device and sent to First Data 3. Encrypted Transaction is Decrypted using Private Key in First Data’s HSM 4. Card number is passed to bank for authorization and SafeProxy server for tokenization 5. Authorization and token are returned to the merchant 6. Token is stored in place of the card number in all places 7. Adjustments, refunds, ‘Card not present’, and settlement use the token in place of the card number 6 Merchant Environment First Data Datacenter 4 Transaction Log Settlement Data Warehouse 6 SafeProxy Analytics Anti Fraud 6 6

Technologies Leveraged Two-level approach to protecting data at every point Public/Private Key encryption (Asymmetric) Data encrypted at capture with Public Key and can only be decrypted by the Private Key held by First Data Encryption is only used to protect PAN during transit or offline situations Tokenization Replacement of PAN with a random number (Token) - no key to “crack” or steal Token uses the same number format as the card data - last 4 digits of PAN are retained in the token 1:1 Mapping of token to a PAN - the same card always returns the same token Token replaces the card data in the merchants system

Benefits The First Data® TransArmorSM solution removes sensitive payment card data from Merchants’ systems Key Benefits Risk Reduction Increases security of payment card transactions protecting your brand reputation & revenue stream Less complex and more secure than encryption alone Warrants against a compromise on the Token Cost Savings Significantly reduces PCI remediation timelines (up to 50%)1 Significantly reduces PCI compliance scope (up to 80%)2 Operational cost that scales with consumption vs. large, recurrent capital outlays Business Continuity Hardware, card association and merchant acquirer agnostic Integrates with VARs and Third Party solutions Enables continued analytics and reporting capabilities Enables cloud computing scenarios 1Interview with Coalfire Systems 2Interview with Securitymetrics

How Can You Get Started? Contact your First Data Sales Representative Availability in early 2010 Message specifications available soon