Welcome!

News Feed Item

Payment Processors and Device Manufacturers Embrace Voltage Security(TM) Point-to-Point Encryption

Voltage SecureData Payments(TM) Empowers Merchants With the Highest Level of Security to Mitigate the Risk of Cardholder Data Breaches

CUPERTINO, CA -- (Marketwired) -- 05/07/14 -- Expanding its leadership in the retail payments industry, Voltage Security today announced that Uniform Industrial Corporation (UIC) now supports Voltage Format-Preserving Encryption™ (FPE), a powerful component of Voltage SecureData Payments™ with Voltage Identity-Based Encryption™ (IBE), providing merchants with P2PE (point-to-point encryption), otherwise known as end-to-end encryption, from a payment reading device to a trusted processing host.

This expands a previous partnership with Heartland Payment Systems in which UIC and Voltage provided end-to-end encryption for Heartland's E3™ security solutions, delivering reliable, secure terminal-based communications with billions of transactions on hundreds of thousands of merchant locations across global deployments.

"We see the headlines every day -- retailers are increasingly faced with tremendous pressure and risk when it comes to payment processing and it cuts to the core of their business by impacting customer trust. Malware in the retail IT systems, especially the traditional POS, has resulted in major costly breaches world-wide. We take our role as a technology partner very seriously and we are dedicated to developing solutions that provide the highest level of protection against data loss or breach, as well as enabling PCI compliance cost scope reduction, all at significantly lower implementation and management costs," explained Mark Bower, vice president of product management, Voltage Security.

UIC is now offering Voltage SecureData Payments with Voltage Format-Preserving Encryption to users of its devices of the MSR215E and MSR215T secure MSR readers, and PP790SE and PP795SE All-in-one PIN Pads, as well as the TS890 and TS900 payment terminals.

"We are excited to offer this cutting edge technology and to deliver secure and robust payment devices. By introducing Voltage enabled card readers and PIN pads, not only does it simplify the complex payment security key management, it also establishes the highest level of security to protect payment operators and card holders from fraudulence," said Albert Li, vice president, sales/business development, UIC.

From authorization and settlement, through business processes such as charge-backs, loyalty or repeat payments, merchants and processors must be able to reliably protect credit card data at rest and in transit, and, at the same time, reduce PCI scope as much as possible, without impacting business workflows or customer facing business processes.

"Our partnership with UIC is another example of how widely available Voltage end-to-end encryption is across the payments industry. Businesses have the option to implement Voltage SecureData Payments on a wide variety of payments devices and perform decryption within their own data environments or with a Voltage platform partner, and Voltage works with six of the top eight U.S. payment processors," said Bower.

By strongly encrypting cardholder data at the read head, using tamper-resistant and tamper-evident payment devices, any malware installed on the intermediate POS systems would only have access to the ciphertext, while the keys necessary to decrypt it stay safely inside the most secure PCI environments at the decryption endpoint. The cipher text, using Voltage Format-Preserving Encryption (FPE), can be used by those POS systems, just as the original plaintext was; but, it is useless to any attackers.

Voltage SecureData Payments Dramatically Lowers Management and Compliance Costs

Voltage SecureData Payments is a complete payment transaction protection framework, built on breakthrough technologies encompassing encryption and key management: Voltage Format-Preserving Encryption (FPE) and Voltage Identity-Based Encryption (IBE). These technologies provide a unique architecture that addresses the complexity of retail environments with high transaction volume.

With Voltage FPE, credit card numbers and other types of structured information are protected without the need to change the data format or structure. In addition, data properties are maintained, such as a checksum, and portions of the data can remain in the clear. This aids in preserving existing processes such as BIN routing or use of the last 4 digits of the card in customer service scenarios.

Voltage IBE is a breakthrough in key management that eliminates the complexity of traditional Public Key Infrastructure (PKI) systems and symmetric key systems. In other words, no digital certificates or keys are required to be injected or synchronized. IBE also enables end-to-end encryption from swipe-to-processor and swipe-to-trusted-merchant applications.

Voltage Secure Stateless Tokenization™ (SST), adopted by major global retailers, is an advanced, patent-pending data security technology that provides enterprises, merchants and payment processors with a new approach to help assure protection for payment card data, with significant Payment Card Industry Data Security Standard (PCI DSS) audit scope reduction. Voltage SST technology dramatically improves speed, scalability, security and manageability over conventional and first-generation tokenization solutions.

Voltage SecureData Payments delivers:

  • Reduced PCI audit cost and scope -- End-to-end encryption can be combined easily with tokenization to provide merchants with complete choice in reducing PCI audit scope.
  • Reduced risk of data loss or breach -- Cardholder data is protected or tokenized when it is stored, transmitted, or used. When deployed with sound internal controls, Voltage SecureData Payments renders sensitive information useless to unauthorized users, mitigating risk of data breaches at any point in the payment stream.
  • Significantly lower implementation and management costs -- Keys are securely generated on demand and not stored; point-of-sale (POS) terminal devices are not subject to key injection; and key rotation is automated and transparent, thus eliminating labor-intensive processes and reducing costs.

Voltage SecureData Payments Terminal SDK can be implemented on most payment devices (both traditional and mobile) and payment processing systems. Voltage is already integrated into leading payment card reading devices and pin-pads, offering merchants the flexibility to support the hardware of their choice. The complementary SecureData Payments Host SDK, which performs the decryption of the cardholder data when teamed with Voltage SecureData Appliances and Thales HSMs, supports a wide variety of platforms, including Windows, Linux, HP NonStop, Stratus VOS, and IBM z/OS.

For more information, visit https://www.voltage.com/products/securedata-payments/

For a complete list of payment terminal partners, visit https://www.voltage.com/partners/payment-partners/.

About UIC
Uniform Industrial Corporation positions itself as a professional DMS manufacturer in the payment industry. Since its inception in 1983, UIC has been a leading national provider of award-winning components and systems for banking, and retail solutions. The company's simple-to-use products combine affordability, reliability, and performance to enable the most high-value and secure transactions. UIC's innovative products have allowed fast, affordable and reliable payment products driven by unique technological developments in the payments industry. The company has branches in Fremont, USA and Frankfurt, Germany to support the American and European markets. UIC seeks to offer its partners cutting-edge solutions and outstanding customer service that exceed expectations.

About Voltage Security
Voltage Security®, Inc. is the world leader in data-centric encryption and tokenization. Voltage provides trusted data security that scales to deliver cost-effective PCI compliance, scope reduction and secure analytics. Voltage solutions are used by leading enterprises worldwide, reducing risk and protecting brand while enabling business. For more information see www.voltage.com.

Notes: All Voltage trademarks are property of Voltage Security, Inc. All other trademarks are property of their respective owners.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget be reexamined to enable this ongoing shift within the modern software factory? In her Day 2 Keynote at @DevOpsSummit at 21st Cloud Expo, Aruna Ravichandran, VP, DevOps Solutions Marketing, CA Technologies, was jo...
"Storpool does only block-level storage so we do one thing extremely well. The growth in data is what drives the move to software-defined technologies in general and software-defined storage," explained Boyan Ivanov, CEO and co-founder at StorPool, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
As Marc Andreessen says software is eating the world. Everything is rapidly moving toward being software-defined – from our phones and cars through our washing machines to the datacenter. However, there are larger challenges when implementing software defined on a larger scale - when building software defined infrastructure. In his session at 16th Cloud Expo, Boyan Ivanov, CEO of StorPool, provided some practical insights on what, how and why when implementing "software-defined" in the datacent...
Blockchain. A day doesn’t seem to go by without seeing articles and discussions about the technology. According to PwC executive Seamus Cushley, approximately $1.4B has been invested in blockchain just last year. In Gartner’s recent hype cycle for emerging technologies, blockchain is approaching the peak. It is considered by Gartner as one of the ‘Key platform-enabling technologies to track.’ While there is a lot of ‘hype vs reality’ discussions going on, there is no arguing that blockchain is b...
Blockchain is a shared, secure record of exchange that establishes trust, accountability and transparency across business networks. Supported by the Linux Foundation's open source, open-standards based Hyperledger Project, Blockchain has the potential to improve regulatory compliance, reduce cost as well as advance trade. Are you curious about how Blockchain is built for business? In her session at 21st Cloud Expo, René Bostic, Technical VP of the IBM Cloud Unit in North America, discussed the b...
ChatOps is an emerging topic that has led to the wide availability of integrations between group chat and various other tools/platforms. Currently, HipChat is an extremely powerful collaboration platform due to the various ChatOps integrations that are available. However, DevOps automation can involve orchestration and complex workflows. In his session at @DevOpsSummit at 20th Cloud Expo, Himanshu Chhetri, CTO at Addteq, will cover practical examples and use cases such as self-provisioning infra...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
Is advanced scheduling in Kubernetes achievable?Yes, however, how do you properly accommodate every real-life scenario that a Kubernetes user might encounter? How do you leverage advanced scheduling techniques to shape and describe each scenario in easy-to-use rules and configurations? In his session at @DevOpsSummit at 21st Cloud Expo, Oleg Chunikhin, CTO at Kublr, answered these questions and demonstrated techniques for implementing advanced scheduling. For example, using spot instances and co...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, whic...
The use of containers by developers -- and now increasingly IT operators -- has grown from infatuation to deep and abiding love. But as with any long-term affair, the honeymoon soon leads to needing to live well together ... and maybe even getting some relationship help along the way. And so it goes with container orchestration and automation solutions, which are rapidly emerging as the means to maintain the bliss between rapid container adoption and broad container use among multiple cloud host...
The cloud era has reached the stage where it is no longer a question of whether a company should migrate, but when. Enterprises have embraced the outsourcing of where their various applications are stored and who manages them, saving significant investment along the way. Plus, the cloud has become a defining competitive edge. Companies that fail to successfully adapt risk failure. The media, of course, continues to extol the virtues of the cloud, including how easy it is to get there. Migrating...
Imagine if you will, a retail floor so densely packed with sensors that they can pick up the movements of insects scurrying across a store aisle. Or a component of a piece of factory equipment so well-instrumented that its digital twin provides resolution down to the micrometer.
The need for greater agility and scalability necessitated the digital transformation in the form of following equation: monolithic to microservices to serverless architecture (FaaS). To keep up with the cut-throat competition, the organisations need to update their technology stack to make software development their differentiating factor. Thus microservices architecture emerged as a potential method to provide development teams with greater flexibility and other advantages, such as the abili...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
Product connectivity goes hand and hand these days with increased use of personal data. New IoT devices are becoming more personalized than ever before. In his session at 22nd Cloud Expo | DXWorld Expo, Nicolas Fierro, CEO of MIMIR Blockchain Solutions, will discuss how in order to protect your data and privacy, IoT applications need to embrace Blockchain technology for a new level of product security never before seen - or needed.