Welcome!

News Feed Item

Infinite Peripherals™ Partners with Voltage Security® to Enhance Mobile Payment Data Protection

Infinite Peripherals, Inc. (IPC), the leading developer of mobile point-of-sale (POS) devices, has formed a partnership with leading data protection provider Voltage Security, Inc., which delivers encryption, tokenization and key management solutions to combat security threats. IPC has integrated the Voltage SecureData Payments™ solution to enable customers that use IPC’s Linea Pro® 5 and Infinea Tab® M to take advantage of Voltage’s unique end-to-end encryption system that protects data, simplifies the key injection and key management processes and reduces costs while neutralizing data from advanced malware threats in retail payment data flows that are a top industry concern.

“Voltage offers merchants several advantages – including standards-recognized Format-Preserving Encryption; simplified, remote key management; and an end-to-end architecture – that ultimately save time, money and headaches typically associated with data protection,” said Jeffrey Scott, CEO of Infinite Peripherals.

The Linea Pro 5 and Infinea Tab M add an encrypted MSR, barcode scanner, RFID and Bluetooth® chip to Apple’s® iPhone®, iPod touch® and iPad® mini, equipping them for use with custom software for mobile POS, inventory management and more. The Linea Pro 5 and Infinea Tab M are the first mobile iOS solutions to have earned PCI PTS 3.1 SRED approval, an important part of a merchant’s compliance with the PCI Data Security Standard (PCI DSS).

Simplified Solution

Voltage’s Format-Preserving Encryption (NIST SP800-38G FPE) uses cipher-text that preserves its original format or structure, and its Identity-Based Encryption (IEEE 1363.3 IBE) eliminates the complexity of traditional public key infrastructure (PKI) systems and symmetric key systems – so no digital certificates or keys must be injected or synchronized.

Now, with Voltage SecureData Payments, merchants benefit from the only encryption solution in the world that uses stateless key management, which eliminates the cumbersome process of encryption key injection on the Linea Pro 5 and Infinea Tab M. Instead, transactions are encrypted using a randomly generated key that is regularly rotated within the Linea Pro 5 or Infinea Tab M devices.

“Merchants may now activate Voltage SecureData Payments, our end-to-end encryption solution, on an expanded list of mobile payment devices, in addition to traditional PIN pads and terminals,” said George Rice, director of business development for Voltage Security. “Voltage SecureData Payments removes all requirements to inject, store and manage encryption keys in payment devices, making it the easiest, most efficient way for retailers to protect cardholder data and reduce PCI-DSS audit scope.”

Encryption keys are securely generated on demand with Voltage Stateless Key Management. Key rotation is automatic and transparent, thereby reducing costs and eliminating the labor-intensive processes traditionally associated with key management. Furthermore, Voltage’s solution works “off-the-shelf,” and does not require any steps to turn on encryption or synchronize the device with a processing host, which simplifies activation and ongoing management. Voltage SecureData Payments is compatible with existing and new deployments.

About Infinite Peripherals

Since 1993, Infinite Peripherals, Inc. (IPC) has been fueling mobility with cutting-edge mobile peripheral devices, receipt printers, mechanisms and receipt printer-related components. Numerous major retailers in the United States are moving to mobile POS with IPC’s Linea Pro® and Infinea Tab®, helping to transform shopping, drive traffic and increase customer conversion rates. Anticipating trends and pre-empting solutions for a constantly evolving business landscape, IPC enhances operations in retail and other industries, including healthcare, hospitality, transportation, warehouse and logistics, entertainment and security. For more information, please visit www.ipcprint.com. Connect with us at www.facebook.com/infiniteperipheralsinc and www.twitter.com/infiniteperiph.

About Voltage Security

Voltage Security, Inc. is the world leader in data-centric security, delivering secure, scalable, and proven data-centric encryption and key management solutions, enabling our customers to effectively combat new and emerging security threats. Leveraging breakthrough encryption technologies, our powerful data protection solutions allow any company to seamlessly secure all types of sensitive corporate and customer information, wherever it resides, while efficiently meeting regulatory compliance and privacy requirements. For more information, please visit www.voltage.com.

Linea Pro and Infinea Tab are registered trademarks of Infinite Peripherals, Inc. All other trademarks are protected by their respective owners.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
"IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. In...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
"Coalfire is a cyber-risk, security and compliance assessment and advisory services firm. We do a lot of work with the cloud service provider community," explained Ryan McGowan, Vice President, Sales (West) at Coalfire Systems, Inc., in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
DevOps is being widely accepted (if not fully adopted) as essential in enterprise IT. But as Enterprise DevOps gains maturity, expands scope, and increases velocity, the need for data-driven decisions across teams becomes more acute. DevOps teams in any modern business must wrangle the ‘digital exhaust’ from the delivery toolchain, "pervasive" and "cognitive" computing, APIs and services, mobile devices and applications, the Internet of Things, and now even blockchain. In this power panel at @...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...