VeriShield Protect Revolutionary technology that simplifies PCI DSS compliance with no system upgrades Now available on V x Solutions!
Security Breaches In The News
The Challenge Contributing Factors: Too many points of failure Audit oversight on complex networks Monitoring the security level of POS systems is difficult and costly Costly prevention methods Difficulty for retail organizations to meet and retain PCI DSS security compliance
Acquirer’s Security Challenge Monitoring and verification of compliance 80% of identified compromises since Jan. 1, 2005 have occurred at Level 4 merchants Liability placed on acquirers to ensure Level 4 merchants are compliant
Acquirer’s Security Challenge Unauthorized use of terminal An example of how a merchant can set up an exposed network connection without consulting the acquirer… PTSNUnencrypted Data Over Internet PTSN VoIP Gateway VoIP Provider Payment Processor
Conventional Wisdom within the Payments Sector You have to be an expert in a lot of areas to protect your business today SSL, Point Encryption, Firewalls, PCI PED, Security Practices … Prayer, Good Insurance QSA, Scanning, Static Auditing, Analytics …
Not anymore… Protect HTDES Monitor CDMS Mitigate Leaves Useless Data
Current day retail scenario…
/0 8 ROBERT K. SMITH PLEASE SLIDE CARD PIN pad
Full card track data traverses network in the clear until last connection to the processing host = Store A Multilane POS System Store A Back Office Server Company Network Servers Processing Host Secure Frame Connection TRANSACTION PROCESSING PIN pad Points of Potential Compromise
What if the data could be encrypted at the payment device and delivered through same transaction channel without upgrade to current system? Store A Back Office Server Company Network Servers Processing Host ENCRYPTION AT DEVICE? PIN pad Store A Multilane POS System
Track Data is encrypted at PINpad in manner that allows it to use current POS infrastructure. Store A Back Office Server Company Network Servers Processing Host ENCRYPTED TRANSACTION PROCESSING PIN pad secured by VeriShield Protect VeriShield Protect delivers data in same format as POS System is expecting. The encrypted data is then decrypted at the processing host. Transaction Data Encrypted and Secure Store A Multilane POS System
VeriFone’s V x 570 P L E A S E S L I D E C A R D This solution is now available on V x Solutions
Processing Host VeriFone’s V x 570 secured by VeriShield Protect E N C R Y P T E D T R A N S A C T I O N P R O C E S S I N G Transaction Data Encrypted and Secure This solution is now available on V x Solutions
= BIN RoutingH-TDESLast FourTrack Data Resident on Card = Track Data encrypted with Hidden Triple DES (H-TDES) Track data is encrypted at the mag stripe reader using Hidden TDES, a patented technology that reformats the data in a manner that the POS system network still receives the track data format it was expecting… How Is This Accomplished?
Protecting Consumer Data A N D
VeriShield ® Protect Components VeriFone Component: VeriShield ® Protect Encryption Software protects Retailers by seamlessly encrypting consumer card data before it enters the Retailers Point of Sale System…and maintains that protection until it is safely outside of the merchants infrastructure, effectively shielding the merchant from the actual details of the consumer data. Semtek Components: Decryption Appliance high performance decryption appliance. CDMS™ provides merchants and acquirers with a real time understanding of their security status and risk. It is also designed to provide merchant processors a definitive real time view of their entire portfolio without having to rely on self-reporting of the merchants within their system.
Sustainable Security :: CDMS Overview A highly sophisticated monitoring system Security assurance and forensics for every card transaction within the enterprise Delivered in real time The VeriShield Protect solution incorporates access to a Cipher Device Metrics Server™ (CDMS™) that provides a real-time status and alert system to monitor compliance of each and every transaction as it occurs. CDMS Dashboard
CDMS as Definitive Monitoring Tool CDMS Key Features: Why They Matter… Real Time vs. Everything Else When a breach occurs, time-lag to awareness is the critical measure of survivability. Real-time means real mitigation. Real time means the Acquirer is the first to know. Actionable Data vs. Foggy Data Security status should not be an argument. CDMS empirical data (vs. analytics) makes it crystal clear if you are secure or not secure. Auditing vs. Reporting Security monitoring is no place for conflicts of interest. Compliance teams need reporting that is auditable to SAS 70 standards.
The Real Costs of Security Breaches A single lost, stolen, or compromised customer record costs your company exactly $197 according to the Ponemon Institute, a privacy research firm Fines associated with a compromise can equal $25-35 per account number according to Retail Systems Research 80% of credit card data breaches are tied to cash register and other POS devices according to Gartner Inc. A security breach can cost anywhere between $90 and $305 per record according to Forrester Research
VeriShield Protect :: The Benefits to You Cardholder data is never exposed in the POS environment Simplifies PCI DSS compliance Significantly reduces impact of costly audits, prevention methods and potential breaches No impact to current POS system Installing VeriShield Protect is transparent to the POS and does not require any software changes No impact to cardholder Does not require any additional steps or actions by the customer
Ensure your payment system is secure with VeriShield Protect.