1 / 33

VeriShield Protect

VeriShield Protect. Revolutionary end-to-end encryption technology that simplifies PCI DSS compliance with no system upgrades. Now available on V x Solutions!.

yetta
Download Presentation

VeriShield Protect

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. VeriShield Protect Revolutionary end-to-end encryption technology that simplifies PCI DSS compliance with no system upgrades Nowavailable on Vx Solutions!

  2. “[It is recommended that]Enterprises that accept, process or transmit cardholder data implement end-to-end card data encryption and stop transmitting sensitive card data ‘in the clear’.” Avivah Litan, Gartner Analyst Gartner Briefing, January 23, 2009 “We have industry-leading encryption, but the data has to be unencrypted to request the information. The sniffer was able to grab that authorization data at that point.” President/CFO A Large Processor In particular, the standards require companies to encrypt data that travels over computer networks “that are easy and common for a hacker to intercept”. Whether certain internal networks are “easy and common” to crack is a matter of judgment, so Navetta believes Hannaford may have erroneously felt safe leaving data unencrypted in a spot that turned out to be vulnerable. David Navetta, President InfoSec Compliance LLC

  3. Plus the growing # of breaches = Cost to Comply — Cost of a Breach For merchants who have become compliant: NEED A SOLUTION!

  4. Merchant’s Security Challenge Difficult for organizations to meet PCI DSS security compliance Recent events show that maintaining compliance may be even more difficult Too many points of failure ContributingFactors Audit oversight on complex networks Monitoring the security level of POS systems is difficult and costly Costly prevention methods

  5. S E C U R I T Y F A C T 80% of identified compromises since Jan. 1, 2005have occurred atLevel 4 merchants Acquirer’s Security Challenge Monitoring and verification of compliance for complete portfolio – Level 1 to Level 4 Level 1 and 2 merchants can have complex systems Volume of Level 4 merchants and their general lack of knowledge on data security Liability placed on acquirers to ensure Level 4 merchants are compliant

  6. Current day retail scenario …

  7. Points of Potential Compromise Secure Frame Connection Store AMultilane POS System Store ABack Office Server Company Network Servers Processing Host PIN pad Full card track data traverses networkin the clear until last connection to the processing host. TRANSACTIONPROCESSING 45122113133121=12311331441414323232

  8. How to address the security dilemma …

  9. 298101 569982 218934 009321 677882 395864 212988 320023 983277 928383 012398 455781 395684 887154 760033 20017632108900331272 98740300023954232128 32398566120907612778 55623210799095496331 65678823224350116785 23900934586793456821 54673122093459968312 78001239248290434298 09123963364327496032 52919951005333143465 91119923884252413148 02125952110177320187 93348955819021759690 12561963091370437047 08119212884426940234 Encryption at the Point of Swipe VeriShield Protect uses VeriShield Hidden Encryption™(VHE), a patented format-preserving technology that reformats the data in a manner that the POS system network still receives the track data format it was expecting ... 435688 760033 1588= 08119212884426940234 BIN Routing H-TDES Last Four Track Data Resident on Card 435688 298101 1588= 20017632108900331272 Track Data encrypted withVeriShield Hidden Encryption (VHE)

  10. 5491 2223 4233 1222 12/08 ROBERT K. SMITH VeriFone PIN pad PLEASE SLIDE CARD

  11. PIN pad Card data is encrypted at the payment device and delivered through same transaction channelwithout upgrade to current systems ENCRYPTION AT DEVICE? Store AMultilane POS System Store ABack Office Server Company Network Servers Processing Host

  12. Transaction Data Encrypted and Secure Store ABack Office Server Company Network Servers Processing Host PIN pad secured by VeriShield Protect Track Data is encrypted at PINpad in manner that allows it to use current POS infrastructure. VeriShield Protect delivers data in same format as POS System is expecting. ENCRYPTEDTRANSACTIONPROCESSING The encrypted data is then decrypted at the processing host. 4356882981011588=20017632108900331272 Store AMultilane POS System

  13. VeriFone Vx 570 This solution isnow availableon Vx Solutions PLEASESLIDE CARD

  14. VeriFone Vx 570secured byVeriShield Protect This solution isnow availableon Vx Solutions ENCRYPTEDTRANSACTIONPROCESSING 4356882981011588=20017632108900331272 Transaction Data Encrypted and Secure Processing Host

  15. VeriShield Protect Now Offered in Multiple Ways Enterprise Managed Processor hosted Merchant hosted VeriFone hosted

  16. VeriShield Protect Now Offered in Multiple Ways Enterprise Managed Processor hosted Merchant hosted VeriFone hosted

  17. VeriShield Protect Now Offered in Multiple Ways Enterprise – Processor Encryption is transparent through processing Transparent to merchant systems Data decrypted at secure host processing facility No impact to merchants

  18. VeriShield Protect Now Offered in Multiple Ways Enterprise Managed Processor hosted Merchant hosted VeriFone hosted

  19. VeriShield Protect Now Offered in Multiple Ways Enterprise – Merchant HQ Solution for large retailer customers Gives total control to the retailer Offers immediate protection; more rapid time to market Data decrypted at merchant central facility Secure transmission from HQ to processor

  20. VeriShield Protect Now Offered in Multiple Ways Enterprise Managed Processor hosted Merchant hosted VeriFone hosted

  21. VeriShield Protect Now Offered in Multiple Ways Managed On VeriFone’s Gateway Data decrypted at VeriFone’s gateway and securely transmitted to processor Direct and reseller models Already certified by all the major processors; more rapid time to market for merchant and reseller Single interface for reporting and terminal management Transaction consolidation for merchants across multiple terminal/comm types

  22. Data Encryption Zone Merchant Device Merchant Data Center Acquirer/Processor Gateway Visanet Issuer Better Good Best POS device levelapplications thatencrypt card data Network level applicationsthat decrypt and monitor VeriFone deploys technologies at the “end points” of the card payment processing chain, hence “end-to-end” encryption. End-to-End Encryption Explained

  23. VeriShield Hidden Encryption 4356882981011588=20017632108900331272 Track Data encrypted with VeriShield Hidden Encryption (VHE) Clear Data 4356887600331588=08119212884426940234 Clear Track 2 or Equivalent Data Triple DES +37% Payload 0xb524190b811cbe5cd550892da8168a4c7d5d651f50892da8 AES +70% Payload 5d1ef20dced6bcbc12131ac7c54788aa6743C3D1519AB4F2CD9A78AB09A511BD VeriShield Hidden Encryption Versus Competition Incompatible with current integrated systems.Requires new development to make compatible.

  24. Web Based Monitoring/Reporting The VeriShield Protect solution incorporates access to a Secure Device Management Service (VSDMS) that provides a real-time status and alert system to monitor compliance of each and every transaction as it occurs. A highly sophisticated monitoring system Security assurance and forensics for every card transaction within the enterprise Delivered in real time VSDMS Dashboard

  25. VSDMS as Definitive Monitoring Tool VeriShield Secure Device Management (VSDMS)Key Features and Why They Matter… Real Time vs. Everything Else When a breach occurs, time lag to awareness is the critical measure of survivability. Real time means real mitigation. Real time means the Acquirer is the first to know. Actionable Data vs. Foggy Data Security status should not be an argument. VSDMS empirical data (vs. analytics) makes it crystal clear if you are secure or not secure. Auditing vs. Reporting Security monitoring is no place for conflicts of interest. Compliance teams need reporting that is auditable to SAS 70 standards.

  26. VeriShield Hidden Encryption 4356882981011588=20017632108900331272 Track Data encrypted with VeriShield Hidden Encryption (VHE) Triple DES +37% Payload 0xb524190b811cbe5cd550892da8168a4c7d5d651f50892da8 Incompatible with current integrated systems.Requires new development to make compatible. Value Proposition Delivers true end-to-end encryption to the merchant Takes merchant out of the data security business Best opportunity for PCI DSS “de-scoping” Superior security investment ROI

  27. 435688 760033 1588= 08119212884426940234 Track Data Resident on Card BIN Routing H-TDES Last Four 435688 298101 1588= 20017632108900331272 Track Data encrypted withVeriShield Hidden Encryption (VHE) VeriShield Protect Value Proposition VHE™ delivers encryption in a way that is transparent to the merchant’s receiving systems Rapid deployment Low disruption No POS system impact

  28. VeriShield Protect Value Proposition Ensures that if the merchant is breached,they will not suffer harm NO USEABLE DATA means NO HARM

  29. VeriShield Protect Value Proposition Monitors all systems in real timeat the device level (VSDMS) Far superior to audit based approach Definitive, real-time security assurance

  30. For More Information Visit www.verifone.com/definitivesecurity

More Related