SlideShare a Scribd company logo
1 of 4
TransArmor Solution                        ®



Protect valuable payment card data with the First Data® TransArmor® solution.
Secure payment card data from the point of sale and prevent it from entering
your environment through the powerful combination of tokenization and
encryption to help reduce your risk and simplify your PCI compliance effort.

The Challenge                                                                                The Solution
Payment card numbers are valuable and represent                                              The First Data TransArmor solution is a powerful
prime targets for fraudsters and cyber-criminals. With                                       payment security solution that combines the flexibility of
more than 900 million payment card records breached                                          software- or hardware-based encryption with random-
between 2004 – 2009 , businesses have collectively
                                  1                                                          number tokenization. This unique layered service protects
spent more than $1B on Payment Card Industry Data                                            merchants and consumers from the risks of transmitting
Security Standard (PCI DSS) compliance . Securing         2                                  and storing vulnerable card data while leaving business
payment card numbers and complying with PCI DSS                                              processes intact. With the TransArmor solution, payment
requirements are critical, but security spend and                                            card data is protected at every transaction stage - in
potential losses from fraud can cut significantly into                                       transit, in use and at rest - reducing risk as well as the
your bottom line, translating to average costs in 2009                                       scope and cost of PCI compliance.
of $204 per compromised record .                3

                                                                                             JJ During a sale, card data is encrypted as soon as
The challenge is to find a comprehensive solution that lets                                     it enters the merchant environment – prior to
                                                                                                transmission – and is protected throughout the
you maintain the benefits derived from card acceptance
                                                                                                entire transmission process.
and transaction data while minimizing the risk involved
                                                                                             JJ During the authorization process, the Primary
in transmitting and maintaining that data while also
                                                                                                Account Number (PAN) is replaced with a randomly-
reducing the scope and cost of PCI compliance.
                                                                                                generated token value that can be used for business
                                                                                                activities and analytics.

                                                                                             JJ Each time a specific card is used to make a payment,
                                                                                                the TransArmor solution returns the same token
                                                                                                number to the merchant. This 1:1 relationship means
                                                                                                you can track and analyze an individual customer’s
                                                                                                buying behavior without housing payment card data
                                                                                                in your business systems.

                                                                                             JJ The random-number token eliminates sensitive
                                                                                                cardholder information from the merchant
                                                                                                environment, thereby removing systems that store
                                                                                                the token from PCI scope and ensuring that payment
firstdata.com                                                                                   card numbers cannot be identified.
1
    Verizon, 2010 Data Breach Investigations Report, Verizon Business RISK Team in cooperation with the United States Secret Service, 2010
2
    Letter to Bob Russo of the PCI Security Standards Council from the National Retail Federation, et. al., June 9, 2009.
3
    Ponemon Institute, 2009 Annual Study: Cost of a Data Breach, January 2010
Two Layers of Security:
The Industry Standard                                          Benefits to Your Business
Payment security is paramount for any business, however        JJ Risk removed while business processes remain
                                                                  intact—removing sensitive card data and replacing it
it is difficult to maintain constant vigilance over every
                                                                  with something of no inherent value outside of your
data access point. To address the security challenge, the
                                                                  business secures the payment transaction flow while
TransArmor solution offers multiple layers of security that       still supporting business analytics and processes.
make cardholder data significantly more secure while
reducing the scope and cost of PCI compliance. The             JJ Flexible, layered approach to security reduces
solution offers you the flexibility to choose the encryption      card data vulnerability and merchant liability—
                                                                  protects data with state-of-the-art tokenization and
and tokenization combination that best meets your needs.
                                                                  encryption and removes actual card data, thereby
                                                                  reducing the risk of data loss, brand damage, loss of
                                                                  customer confidence, financial liability and litigation.
Software-based encryption, supported by RSA, the
security division of EMC, can be installed on PC-based
                                                               JJ Reduction of PCI compliance time, costs and effort—
POS systems, letting you add the TransArmor solution              removing sensitive card data from merchant systems
with little-to-no investment in new or upgraded hardware.         also removes it from PCI scope. This minimizes the
Format-preserving, hardware-based encryption,                     amount of time and resources needed to meet PCI
                                                                  requirements.
available through the VeriFone edition and offered on
VeriFone devices such as the MX 800 Series and Secure          	              • Can reduce the scope of annual PCI audits by 	
                                                               	                as much as 80%4
PumpPAY and Ruby SuperSystem point-of-sale (POS)
                                                               	              • Can reduce the time PCI compliance requires 	
solutions, requires no software changes at the POS
                                                               	                by as much as 50% 5
application level and no extra steps or training for the
retailer. Multiple encryption options mean that you can
                                                               JJ Minimizes IT resource allocation to implement—
encrypt the data at the point-of-capture and remove it            enabling businesses to maintain focus on broader
from PCI scope, limiting the card data environment to             business initiatives. Works with First Data, VeriFone
the point-of-capture device itself.                               and other terminals or point-of-sale systems and can
                                                                  be applied across brick-and-click environments.

                                                               	              • No new hardware in most cases
While encryption protects the data in motion through           	              • No changes to back-end IT systems
your systems prior to authorization, tokenization              	              • No employee training
removes the card data from your environment after
authorization. Provided by the RSA SafeProxy architecture,     JJ Solution from the market leaders in payments and
tokenization replaces the primary account number with             security—designed to address the challenges of
                                                                  payment security in partnership between First Data,
a randomly generated data substitute, called a token,
                                                                  a leader in electronic commerce and payments
to protect card data at rest and in use. The token retains
                                                                  technology, VeriFone Systems, a leading provider
the business value of payment card data that is needed            of electronic payment solutions, and RSA, the
for analytical activities based on card spending. However,        Security Division of EMC and leading developer
the token is of no value whatsoever to cybercriminals             of information security solutions.

and cannot be used to identify a card number or to                 4
                                                                       Interview with CoalFireSystems.
fraudulently initiate new transactions. You can maintain           5
                                                                       Interview with SecurityMetrics.

your business processes without the risks, or costs, of
storing card data.
TransArmor Solution                ®



           How the TransArmor Solution Works
          The TransArmor solution is an industry-unique combination of encryption technology to protect sensitive
Card Present (CP)
          payment card data in-transit along with tokenization technology to safely store card data post authorization.




                       Merchant Enviroment                            First Data Datacenter                   Bank




                1     merchant            2       card data
                                                  encrypted
                                                                                 3                        4   issuer
                                                                             First Data
                                                                               switch

               6      merchant                5     token
                                                                           Token Number
                                                                             Assigned


                transaction log
                  settlement
                data warehouse



                                         6 anti-fraud
                                                                       4 Tokenization
                                                                            Technology
                                 6    analytics




                    1. Consumer presents card to merchant POS or fuel pump

                    2. Card data is encrypted and transmitted to First Data front-end

                    3. First Data front-end decrypts the data payload

                    4. Card data is sent to issuing bank for authorization and , in parallel, tokenized

                    5. Token is paired with authorization response and sent back to the merchant

                    6. Merchant stores token instead of card data in their environment and uses token for subsequent 	
                       business processes
Payment Solutions for
                                                                                               Maximum Performance
                                                                                               Around the world every day, First Data makes
                                                                                               payment transactions secure, fast and easy for
                                                                                               merchants, financial institutions and their customers.
                                                                                               We leverage our unparalleled product portfolio and
                                                                                               expertise to deliver processing solutions that drive
                                                                                               customer revenue and profitability. Whether the
                                                                                               payment is by debit or credit, gift card, check or
                                                                                               mobile phone, online or at the point of sale, First Data
                                                                                               goes beyond the transaction to help you maximize
                                                                                               value for your business.


                                                                                               For more information, contact your Sales
                                                                                               Representative or visit firstdata.com.
                                                                                                                                                                             17B




© 2011 First Data Corporation. All Rights Reserved. All trademarks, service marks and trade names referenced in this material are the property of their respective owners.

More Related Content

Similar to First Data Trans Armor

The Smart Approach To Pci DSS Compliance – Braintree White Paper
The Smart Approach To Pci DSS Compliance – Braintree White PaperThe Smart Approach To Pci DSS Compliance – Braintree White Paper
The Smart Approach To Pci DSS Compliance – Braintree White PaperBen Rothke
 
6 ways reduce pci dss audit scope tokenizing cardholder data
6 ways reduce pci dss audit scope tokenizing cardholder data6 ways reduce pci dss audit scope tokenizing cardholder data
6 ways reduce pci dss audit scope tokenizing cardholder dataRichard Thompson
 
Tokenization: What's Next After PCI?
Tokenization: What's Next After PCI?Tokenization: What's Next After PCI?
Tokenization: What's Next After PCI?EMC
 
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011Andris Soroka
 
Tokenization Payment Data Out Securing Payment Data Storage
Tokenization Payment Data Out Securing Payment Data StorageTokenization Payment Data Out Securing Payment Data Storage
Tokenization Payment Data Out Securing Payment Data Storage- Mark - Fullbright
 
Dynamag by MagTek
Dynamag by MagTekDynamag by MagTek
Dynamag by MagTek2FA, Inc.
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overviewokrantz
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingLennon808
 
Thought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking ApplicationsThought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking ApplicationsInfosys Finacle
 
Key Security Measures Behind Digital Payment Systems
Key Security Measures Behind Digital Payment SystemsKey Security Measures Behind Digital Payment Systems
Key Security Measures Behind Digital Payment SystemsITIO Innovex
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...IRJET Journal
 
Vormetric data security complying with pci dss encryption rules
Vormetric data security  complying with pci dss encryption rulesVormetric data security  complying with pci dss encryption rules
Vormetric data security complying with pci dss encryption rulesVormetric Inc
 
PCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline CompliancePCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline ComplianceTokenEx
 
Best practices in Digital Payments to Minimize Security Threats.pdf
Best practices in Digital Payments to Minimize Security Threats.pdfBest practices in Digital Payments to Minimize Security Threats.pdf
Best practices in Digital Payments to Minimize Security Threats.pdfPay10
 
Hacking Point of Sale
Hacking Point of SaleHacking Point of Sale
Hacking Point of SaleTripwire
 
The Path to Payment Security
The Path to Payment SecurityThe Path to Payment Security
The Path to Payment SecurityTom Cooley
 
White Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI Measures
White Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI MeasuresWhite Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI Measures
White Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI MeasuresNisum
 

Similar to First Data Trans Armor (20)

The Smart Approach To Pci DSS Compliance – Braintree White Paper
The Smart Approach To Pci DSS Compliance – Braintree White PaperThe Smart Approach To Pci DSS Compliance – Braintree White Paper
The Smart Approach To Pci DSS Compliance – Braintree White Paper
 
6 ways reduce pci dss audit scope tokenizing cardholder data
6 ways reduce pci dss audit scope tokenizing cardholder data6 ways reduce pci dss audit scope tokenizing cardholder data
6 ways reduce pci dss audit scope tokenizing cardholder data
 
Tokenization: What's Next After PCI?
Tokenization: What's Next After PCI?Tokenization: What's Next After PCI?
Tokenization: What's Next After PCI?
 
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
DSS - ITSEC conf - Arcot - Security for eCommerce - Riga Nov2011
 
Tokenization Payment Data Out Securing Payment Data Storage
Tokenization Payment Data Out Securing Payment Data StorageTokenization Payment Data Out Securing Payment Data Storage
Tokenization Payment Data Out Securing Payment Data Storage
 
Dynamag by MagTek
Dynamag by MagTekDynamag by MagTek
Dynamag by MagTek
 
M Commerce
M CommerceM Commerce
M Commerce
 
Fu3111411144
Fu3111411144Fu3111411144
Fu3111411144
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overview
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card Processing
 
Thought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking ApplicationsThought Paper: Overview of Banking Applications
Thought Paper: Overview of Banking Applications
 
Key Security Measures Behind Digital Payment Systems
Key Security Measures Behind Digital Payment SystemsKey Security Measures Behind Digital Payment Systems
Key Security Measures Behind Digital Payment Systems
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
 
Vormetric data security complying with pci dss encryption rules
Vormetric data security  complying with pci dss encryption rulesVormetric data security  complying with pci dss encryption rules
Vormetric data security complying with pci dss encryption rules
 
FD50
FD50FD50
FD50
 
PCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline CompliancePCI Descoping: How to Reduce Controls and Streamline Compliance
PCI Descoping: How to Reduce Controls and Streamline Compliance
 
Best practices in Digital Payments to Minimize Security Threats.pdf
Best practices in Digital Payments to Minimize Security Threats.pdfBest practices in Digital Payments to Minimize Security Threats.pdf
Best practices in Digital Payments to Minimize Security Threats.pdf
 
Hacking Point of Sale
Hacking Point of SaleHacking Point of Sale
Hacking Point of Sale
 
The Path to Payment Security
The Path to Payment SecurityThe Path to Payment Security
The Path to Payment Security
 
White Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI Measures
White Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI MeasuresWhite Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI Measures
White Paper: Tokenization, Credit Card Fraud Prevention, Beyond PCI Measures
 

Recently uploaded

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 

Recently uploaded (20)

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 

First Data Trans Armor

  • 1. TransArmor Solution ® Protect valuable payment card data with the First Data® TransArmor® solution. Secure payment card data from the point of sale and prevent it from entering your environment through the powerful combination of tokenization and encryption to help reduce your risk and simplify your PCI compliance effort. The Challenge The Solution Payment card numbers are valuable and represent The First Data TransArmor solution is a powerful prime targets for fraudsters and cyber-criminals. With payment security solution that combines the flexibility of more than 900 million payment card records breached software- or hardware-based encryption with random- between 2004 – 2009 , businesses have collectively 1 number tokenization. This unique layered service protects spent more than $1B on Payment Card Industry Data merchants and consumers from the risks of transmitting Security Standard (PCI DSS) compliance . Securing 2 and storing vulnerable card data while leaving business payment card numbers and complying with PCI DSS processes intact. With the TransArmor solution, payment requirements are critical, but security spend and card data is protected at every transaction stage - in potential losses from fraud can cut significantly into transit, in use and at rest - reducing risk as well as the your bottom line, translating to average costs in 2009 scope and cost of PCI compliance. of $204 per compromised record . 3 JJ During a sale, card data is encrypted as soon as The challenge is to find a comprehensive solution that lets it enters the merchant environment – prior to transmission – and is protected throughout the you maintain the benefits derived from card acceptance entire transmission process. and transaction data while minimizing the risk involved JJ During the authorization process, the Primary in transmitting and maintaining that data while also Account Number (PAN) is replaced with a randomly- reducing the scope and cost of PCI compliance. generated token value that can be used for business activities and analytics. JJ Each time a specific card is used to make a payment, the TransArmor solution returns the same token number to the merchant. This 1:1 relationship means you can track and analyze an individual customer’s buying behavior without housing payment card data in your business systems. JJ The random-number token eliminates sensitive cardholder information from the merchant environment, thereby removing systems that store the token from PCI scope and ensuring that payment firstdata.com card numbers cannot be identified. 1 Verizon, 2010 Data Breach Investigations Report, Verizon Business RISK Team in cooperation with the United States Secret Service, 2010 2 Letter to Bob Russo of the PCI Security Standards Council from the National Retail Federation, et. al., June 9, 2009. 3 Ponemon Institute, 2009 Annual Study: Cost of a Data Breach, January 2010
  • 2. Two Layers of Security: The Industry Standard Benefits to Your Business Payment security is paramount for any business, however JJ Risk removed while business processes remain intact—removing sensitive card data and replacing it it is difficult to maintain constant vigilance over every with something of no inherent value outside of your data access point. To address the security challenge, the business secures the payment transaction flow while TransArmor solution offers multiple layers of security that still supporting business analytics and processes. make cardholder data significantly more secure while reducing the scope and cost of PCI compliance. The JJ Flexible, layered approach to security reduces solution offers you the flexibility to choose the encryption card data vulnerability and merchant liability— protects data with state-of-the-art tokenization and and tokenization combination that best meets your needs. encryption and removes actual card data, thereby reducing the risk of data loss, brand damage, loss of customer confidence, financial liability and litigation. Software-based encryption, supported by RSA, the security division of EMC, can be installed on PC-based JJ Reduction of PCI compliance time, costs and effort— POS systems, letting you add the TransArmor solution removing sensitive card data from merchant systems with little-to-no investment in new or upgraded hardware. also removes it from PCI scope. This minimizes the Format-preserving, hardware-based encryption, amount of time and resources needed to meet PCI requirements. available through the VeriFone edition and offered on VeriFone devices such as the MX 800 Series and Secure • Can reduce the scope of annual PCI audits by as much as 80%4 PumpPAY and Ruby SuperSystem point-of-sale (POS) • Can reduce the time PCI compliance requires solutions, requires no software changes at the POS by as much as 50% 5 application level and no extra steps or training for the retailer. Multiple encryption options mean that you can JJ Minimizes IT resource allocation to implement— encrypt the data at the point-of-capture and remove it enabling businesses to maintain focus on broader from PCI scope, limiting the card data environment to business initiatives. Works with First Data, VeriFone the point-of-capture device itself. and other terminals or point-of-sale systems and can be applied across brick-and-click environments. • No new hardware in most cases While encryption protects the data in motion through • No changes to back-end IT systems your systems prior to authorization, tokenization • No employee training removes the card data from your environment after authorization. Provided by the RSA SafeProxy architecture, JJ Solution from the market leaders in payments and tokenization replaces the primary account number with security—designed to address the challenges of payment security in partnership between First Data, a randomly generated data substitute, called a token, a leader in electronic commerce and payments to protect card data at rest and in use. The token retains technology, VeriFone Systems, a leading provider the business value of payment card data that is needed of electronic payment solutions, and RSA, the for analytical activities based on card spending. However, Security Division of EMC and leading developer the token is of no value whatsoever to cybercriminals of information security solutions. and cannot be used to identify a card number or to 4 Interview with CoalFireSystems. fraudulently initiate new transactions. You can maintain 5 Interview with SecurityMetrics. your business processes without the risks, or costs, of storing card data.
  • 3. TransArmor Solution ® How the TransArmor Solution Works The TransArmor solution is an industry-unique combination of encryption technology to protect sensitive Card Present (CP) payment card data in-transit along with tokenization technology to safely store card data post authorization. Merchant Enviroment First Data Datacenter Bank 1 merchant 2 card data encrypted 3 4 issuer First Data switch 6 merchant 5 token Token Number Assigned transaction log settlement data warehouse 6 anti-fraud 4 Tokenization Technology 6 analytics 1. Consumer presents card to merchant POS or fuel pump 2. Card data is encrypted and transmitted to First Data front-end 3. First Data front-end decrypts the data payload 4. Card data is sent to issuing bank for authorization and , in parallel, tokenized 5. Token is paired with authorization response and sent back to the merchant 6. Merchant stores token instead of card data in their environment and uses token for subsequent business processes
  • 4. Payment Solutions for Maximum Performance Around the world every day, First Data makes payment transactions secure, fast and easy for merchants, financial institutions and their customers. We leverage our unparalleled product portfolio and expertise to deliver processing solutions that drive customer revenue and profitability. Whether the payment is by debit or credit, gift card, check or mobile phone, online or at the point of sale, First Data goes beyond the transaction to help you maximize value for your business. For more information, contact your Sales Representative or visit firstdata.com. 17B © 2011 First Data Corporation. All Rights Reserved. All trademarks, service marks and trade names referenced in this material are the property of their respective owners.