SlideShare a Scribd company logo
Point-to-Point Encryption
Solutions from Futurex
Proven Solutions for Preventing Card Fraud
Agenda
• About Futurex
• Unique Perspective of Futurex
• P2PE Solutions
– Excrypt SSP9000 HSM
– Securus Remote Access Device
– Guardian9000 Secure Management Server
• Futurex Enterprise Security Platform
– Futurex Hosted Certificate Authority
• Xceptional Support
Futurex. An Innovative Leader in
Encryption Solutions.
• For over 30 years, more than 15,000 customers worldwide
• Members of ANSI X9F and PCI Security standards bodies,
CTGA certified Solutions Architects
• Hardware-based solutions with integrated applications
provide the highest levels of compliance and security
• Entrepreneurial culture, fostering agility and innovation in
the development of hardware encryption solutions
• Results-oriented engineering team based in our U.S.
Technology Campus, with significant experience delivering
First-to-Market Customer Initiatives
Unique Perspective of Futurex
As a hardware security solution provider, Futurex has a
unique perspective
 Acquirers: transaction security (P2PE)
 Merchants: transaction security (P2PE), key management
 Device Manufacturers: certificate authority, key management
 Switches: transaction security
 Issuers: card security (EMV data preparation, personalization)
 Merchant Service Providers: key management
4
Sensitive Cardholder Data
Encrypted
Data
Acquirer
• Decrypt Cardholder Data
• Generate Secure Token
Point-of-Interaction (merchant)
%B4388547890123456^DOE/JOHN^1402547834?
Point-to-Point Encryption of Cardholder Data
Token
Token
Secure Cryptographic
Device (SCD)
Why A Secure Cryptographic Device?
• Meets PCI Requirements
• Dual Control
• Tamper Protection for Keys
• Prevents insider attack
• Split Knowledge
• Encryption Key Management
6
A secure, scalable hardware
security module solution
Host
Application
Hardware
Security Module
Futurex Hardware Security Module Technology
Robust Functionality
• Fastest HSMs in the world – up to 2,250 TPS or 8,000 TPS in Enterprise-class model
• Dual, redundant power supplies and Ethernet ports
• Support for wide-ranging functionality, including specialized features for:
healthcare, financial, manufacturing, utility, government, education, retail, and
corporate
Regulatory Compliance
• FIPS 140-2 Level 3, PCI HSM, ANS X9.24 Part 1 and Part 2, TR-39
Securus
Compliant Remote Access Device with Secure Key Loading
•FIPS 140-2 Level 3-validated tablet device for remote
configuration of Futurex solutions
•10.4-inch, full color
touch screen LCD
•PKI-secured remote
loading of Master Key
•Rugged design for field usage
•Portable, with Wi-Fi connectivity
Guardian9000
Secure Management Server for Core Cryptographic Infrastructure
Guardian9000
Primary Site Backup / Disaster Recovery Site
• Centralized Master Key loading and firmware updates
• Load balancing, Nth-degree scalability, and disaster recovery
• Eliminates single points of failure
• Customized alerting over SMTP, SMS, and SNMP
• Automatic synchronization of keys and settings
SMTP Server SNMP Server
Gateway Host
Guardian9000
Excrypt SSP9000
Hardware Security
Module
Excrypt SSP9000
Hardware Security
Module
Excrypt SSP9000
Hardware Security
Module
Excrypt SSP9000
Hardware Security
Module
Scalability, Redundancy, and Manageability
• Nth-degree scalability and load balancing, with no single point of failure
• Logical separation of Master Keys, with per-group function blocking
• Full remote management, including Master Key loading
• Monitoring and alerting via SMTP, SNMP, and SMS
Primary Site
HSM
#1
HSM
#N
Redundant Failover
HSM
#2
HSM
#N
Secondary Site
Direct Load Balancing
Automatic Synchronization
Remote
Access
Device
SMS
SNMP
SMTPSecure
Management
ServerSMS
SNMP
SMTP Secure
Management
Server
Futurex Enterprise Security Platform
• Remote Access
• Centralized
Administration
• High Availability
• Redundant
• Compliant
• Secured
• Customizable
Guardian9000
Backup / Disaster
Recovery HSM Site
Guardian9000
Primary HSM Site
Gateway Host
Securus
Connections TLS/SSL
encrypted
Firmware updates, settings, keys
P2PE Enabled Devices
Securus
Firmware updates, settings, keys
P2PE Secured
Transactions
Site Level Redundancy
Excrypt SSP9000 Excrypt SSP9000
Backup / Disaster
Recovery HSM Site
Guardian9000
Primary HSM Site
Gateway Host
Securus
Connections TLS/SSL
encrypted
Firmware updates, settings, keys
P2PE Enabled Devices
Firmware updates, settings, keys
P2PE Secured
Transactions
Two Sites Managed from One Site
Excrypt SSP9000 Excrypt SSP9000
Guardian9000
Primary HSM Site
Gateway Host
Securus
Connections TLS/SSL
encrypted
Firmware updates, settings, keys
P2PE Enabled Devices
P2PE Secured
Transactions
Single Site with Management
Excrypt SSP9000
Primary HSM Site
Gateway Host
Securus
Connections TLS/SSL
encrypted
P2PE Enabled Devices
P2PE Secured
Transactions
Single Site Basic
Excrypt SSP9000
Exceptional Support
• Extremely knowledgeable TR-39-certified subject matter experts
• 24x7x365 Business Critical support
• Level 1 to Level 3 support
• Xceptional Support Services
• Training (virtual or onsite)
• Customized consulting
• Hosted solutions
• Certificate authority
• PIN & key generation, printing and mailing
• Customized hardware and software solution development
People, Process & Technology
17
Compliance and
Fraud Prevention
People
CTGA Certified Solutions
Architects
Quality Assurance
Xceptional 24x7 Global
Support
Custom Engineering
Process
On-Site & Virtual Training
On-site Implementation
Process Consulting
Procedure Documentation
Technology
FIPS 140-2 Level 3 & PCI HSM
Key Lifecycle Management
EMV and P2PE
Tamper Resistant
Enterprise Platform

More Related Content

What's hot

Security Consideration for Set-top box SoC
Security Consideration for Set-top box SoCSecurity Consideration for Set-top box SoC
Security Consideration for Set-top box SoC
Wesley Li
 
Hotel locks-e790-brochure
Hotel locks-e790-brochureHotel locks-e790-brochure
Hotel locks-e790-brochure
Mail Box Production
 
RSA SecurID Access
RSA SecurID AccessRSA SecurID Access
RSA SecurID Access
MarketingArrowECS_CZ
 
Desklinc cut-sheet
Desklinc cut-sheetDesklinc cut-sheet
Desklinc cut-sheet
ssuserd861f31
 
RSA Secur id for windows
RSA Secur id for windowsRSA Secur id for windows
RSA Secur id for windows
arpit06055
 
Rsa authentication manager 8.2 presentation
Rsa authentication manager 8.2 presentationRsa authentication manager 8.2 presentation
Rsa authentication manager 8.2 presentation
Zeev Shetach
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
ST_World
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
Arash Ramez
 
How to do Cryptography right in Android Part One
How to do Cryptography right in Android Part OneHow to do Cryptography right in Android Part One
How to do Cryptography right in Android Part One
Arash Ramez
 
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedHow to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewed
Arash Ramez
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
Security Innovation
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
Flaskdata.io
 
SmartWorld- What we Do!
SmartWorld- What we Do!SmartWorld- What we Do!
SmartWorld- What we Do!
SmartWorld Exports
 
Pki 201 Key Management
Pki 201 Key ManagementPki 201 Key Management
Pki 201 Key Management
NCC Group
 
Cryptomach_En
Cryptomach_EnCryptomach_En
Cryptomach_En
de77
 
Siincos Remote Connect - Remote Access | Cloud | Industry 4.0
Siincos Remote Connect - Remote Access | Cloud | Industry 4.0Siincos Remote Connect - Remote Access | Cloud | Industry 4.0
Siincos Remote Connect - Remote Access | Cloud | Industry 4.0
Johannes Kinzig
 
SafeNet overview 2014
SafeNet overview 2014SafeNet overview 2014
SafeNet overview 2014
Sectricity
 
Act500
Act500Act500
Act500
Adit Group
 
Atlas brochure
Atlas brochureAtlas brochure
Atlas brochure
Mail Box Production
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part Two
Arash Ramez
 

What's hot (20)

Security Consideration for Set-top box SoC
Security Consideration for Set-top box SoCSecurity Consideration for Set-top box SoC
Security Consideration for Set-top box SoC
 
Hotel locks-e790-brochure
Hotel locks-e790-brochureHotel locks-e790-brochure
Hotel locks-e790-brochure
 
RSA SecurID Access
RSA SecurID AccessRSA SecurID Access
RSA SecurID Access
 
Desklinc cut-sheet
Desklinc cut-sheetDesklinc cut-sheet
Desklinc cut-sheet
 
RSA Secur id for windows
RSA Secur id for windowsRSA Secur id for windows
RSA Secur id for windows
 
Rsa authentication manager 8.2 presentation
Rsa authentication manager 8.2 presentationRsa authentication manager 8.2 presentation
Rsa authentication manager 8.2 presentation
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
 
How to do Cryptography right in Android Part One
How to do Cryptography right in Android Part OneHow to do Cryptography right in Android Part One
How to do Cryptography right in Android Part One
 
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewedHow to do right cryptography in android part 3 / Gated Authentication reviewed
How to do right cryptography in android part 3 / Gated Authentication reviewed
 
Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)Protecting Sensitive Data (and be PCI Compliant too!)
Protecting Sensitive Data (and be PCI Compliant too!)
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
SmartWorld- What we Do!
SmartWorld- What we Do!SmartWorld- What we Do!
SmartWorld- What we Do!
 
Pki 201 Key Management
Pki 201 Key ManagementPki 201 Key Management
Pki 201 Key Management
 
Cryptomach_En
Cryptomach_EnCryptomach_En
Cryptomach_En
 
Siincos Remote Connect - Remote Access | Cloud | Industry 4.0
Siincos Remote Connect - Remote Access | Cloud | Industry 4.0Siincos Remote Connect - Remote Access | Cloud | Industry 4.0
Siincos Remote Connect - Remote Access | Cloud | Industry 4.0
 
SafeNet overview 2014
SafeNet overview 2014SafeNet overview 2014
SafeNet overview 2014
 
Act500
Act500Act500
Act500
 
Atlas brochure
Atlas brochureAtlas brochure
Atlas brochure
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part Two
 

Similar to P2PE Solutions From Futurex

Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Honeywell
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
Ricardo Resnik
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
Jamal Jamali
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
Ajay Nawani
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best Practices
Mike Sherwood
 
Minicom - Remote Data Center Management
Minicom - Remote Data Center ManagementMinicom - Remote Data Center Management
Minicom - Remote Data Center Management
Minicom Advanced Systems
 
Remote IT Mangement
Remote IT MangementRemote IT Mangement
Remote IT Mangement
tsilber
 
Unizen Smart Automation Brochure-2015
Unizen Smart Automation Brochure-2015Unizen Smart Automation Brochure-2015
Unizen Smart Automation Brochure-2015
Gurudev Basavaraj Goud
 
[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device
ICS
 
Netop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNetop remote control 12.5 Brochure
Netop remote control 12.5 Brochure
Nanna Wang
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
David Fuchs
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
Micro Focus
 
Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments
Bunmi Sowande
 
Vindicator Overview
Vindicator OverviewVindicator Overview
Vindicator Overview
dp3b58
 
Comms Care Overview 2011
Comms Care Overview 2011Comms Care Overview 2011
Comms Care Overview 2011
andrewpugh
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
Kim Bookout
 
Comms Care Overview
Comms Care OverviewComms Care Overview
Comms Care Overview
pmurphy123
 
HSM Basic Training
HSM Basic TrainingHSM Basic Training
HSM Basic Training
Md. Budrul Hasan Bhuiyan
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
LF Events
 
ManagedISDNandIPEncryption
ManagedISDNandIPEncryptionManagedISDNandIPEncryption
ManagedISDNandIPEncryption
Al Ewers
 

Similar to P2PE Solutions From Futurex (20)

Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3Mp company overview 2014 0214 version 3
Mp company overview 2014 0214 version 3
 
Hardwar based Security of Systems
Hardwar based Security of SystemsHardwar based Security of Systems
Hardwar based Security of Systems
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best Practices
 
Minicom - Remote Data Center Management
Minicom - Remote Data Center ManagementMinicom - Remote Data Center Management
Minicom - Remote Data Center Management
 
Remote IT Mangement
Remote IT MangementRemote IT Mangement
Remote IT Mangement
 
Unizen Smart Automation Brochure-2015
Unizen Smart Automation Brochure-2015Unizen Smart Automation Brochure-2015
Unizen Smart Automation Brochure-2015
 
[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device
 
Netop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNetop remote control 12.5 Brochure
Netop remote control 12.5 Brochure
 
Consider Sophos - Security Made Simple
Consider Sophos - Security Made SimpleConsider Sophos - Security Made Simple
Consider Sophos - Security Made Simple
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments Securing Virtual and Cloud Environments
Securing Virtual and Cloud Environments
 
Vindicator Overview
Vindicator OverviewVindicator Overview
Vindicator Overview
 
Comms Care Overview 2011
Comms Care Overview 2011Comms Care Overview 2011
Comms Care Overview 2011
 
Hyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challengesHyper Secure Converged Infrastructure solves architectural challenges
Hyper Secure Converged Infrastructure solves architectural challenges
 
Comms Care Overview
Comms Care OverviewComms Care Overview
Comms Care Overview
 
HSM Basic Training
HSM Basic TrainingHSM Basic Training
HSM Basic Training
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
ManagedISDNandIPEncryption
ManagedISDNandIPEncryptionManagedISDNandIPEncryption
ManagedISDNandIPEncryption
 

Recently uploaded

Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 

Recently uploaded (20)

Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 

P2PE Solutions From Futurex

  • 1. Point-to-Point Encryption Solutions from Futurex Proven Solutions for Preventing Card Fraud
  • 2. Agenda • About Futurex • Unique Perspective of Futurex • P2PE Solutions – Excrypt SSP9000 HSM – Securus Remote Access Device – Guardian9000 Secure Management Server • Futurex Enterprise Security Platform – Futurex Hosted Certificate Authority • Xceptional Support
  • 3. Futurex. An Innovative Leader in Encryption Solutions. • For over 30 years, more than 15,000 customers worldwide • Members of ANSI X9F and PCI Security standards bodies, CTGA certified Solutions Architects • Hardware-based solutions with integrated applications provide the highest levels of compliance and security • Entrepreneurial culture, fostering agility and innovation in the development of hardware encryption solutions • Results-oriented engineering team based in our U.S. Technology Campus, with significant experience delivering First-to-Market Customer Initiatives
  • 4. Unique Perspective of Futurex As a hardware security solution provider, Futurex has a unique perspective  Acquirers: transaction security (P2PE)  Merchants: transaction security (P2PE), key management  Device Manufacturers: certificate authority, key management  Switches: transaction security  Issuers: card security (EMV data preparation, personalization)  Merchant Service Providers: key management 4
  • 5. Sensitive Cardholder Data Encrypted Data Acquirer • Decrypt Cardholder Data • Generate Secure Token Point-of-Interaction (merchant) %B4388547890123456^DOE/JOHN^1402547834? Point-to-Point Encryption of Cardholder Data Token Token Secure Cryptographic Device (SCD)
  • 6. Why A Secure Cryptographic Device? • Meets PCI Requirements • Dual Control • Tamper Protection for Keys • Prevents insider attack • Split Knowledge • Encryption Key Management 6 A secure, scalable hardware security module solution
  • 7. Host Application Hardware Security Module Futurex Hardware Security Module Technology Robust Functionality • Fastest HSMs in the world – up to 2,250 TPS or 8,000 TPS in Enterprise-class model • Dual, redundant power supplies and Ethernet ports • Support for wide-ranging functionality, including specialized features for: healthcare, financial, manufacturing, utility, government, education, retail, and corporate Regulatory Compliance • FIPS 140-2 Level 3, PCI HSM, ANS X9.24 Part 1 and Part 2, TR-39
  • 8. Securus Compliant Remote Access Device with Secure Key Loading •FIPS 140-2 Level 3-validated tablet device for remote configuration of Futurex solutions •10.4-inch, full color touch screen LCD •PKI-secured remote loading of Master Key •Rugged design for field usage •Portable, with Wi-Fi connectivity
  • 9. Guardian9000 Secure Management Server for Core Cryptographic Infrastructure Guardian9000 Primary Site Backup / Disaster Recovery Site • Centralized Master Key loading and firmware updates • Load balancing, Nth-degree scalability, and disaster recovery • Eliminates single points of failure • Customized alerting over SMTP, SMS, and SNMP • Automatic synchronization of keys and settings SMTP Server SNMP Server Gateway Host Guardian9000 Excrypt SSP9000 Hardware Security Module Excrypt SSP9000 Hardware Security Module Excrypt SSP9000 Hardware Security Module Excrypt SSP9000 Hardware Security Module
  • 10. Scalability, Redundancy, and Manageability • Nth-degree scalability and load balancing, with no single point of failure • Logical separation of Master Keys, with per-group function blocking • Full remote management, including Master Key loading • Monitoring and alerting via SMTP, SNMP, and SMS Primary Site HSM #1 HSM #N Redundant Failover HSM #2 HSM #N Secondary Site Direct Load Balancing Automatic Synchronization Remote Access Device SMS SNMP SMTPSecure Management ServerSMS SNMP SMTP Secure Management Server
  • 11. Futurex Enterprise Security Platform • Remote Access • Centralized Administration • High Availability • Redundant • Compliant • Secured • Customizable
  • 12. Guardian9000 Backup / Disaster Recovery HSM Site Guardian9000 Primary HSM Site Gateway Host Securus Connections TLS/SSL encrypted Firmware updates, settings, keys P2PE Enabled Devices Securus Firmware updates, settings, keys P2PE Secured Transactions Site Level Redundancy Excrypt SSP9000 Excrypt SSP9000
  • 13. Backup / Disaster Recovery HSM Site Guardian9000 Primary HSM Site Gateway Host Securus Connections TLS/SSL encrypted Firmware updates, settings, keys P2PE Enabled Devices Firmware updates, settings, keys P2PE Secured Transactions Two Sites Managed from One Site Excrypt SSP9000 Excrypt SSP9000
  • 14. Guardian9000 Primary HSM Site Gateway Host Securus Connections TLS/SSL encrypted Firmware updates, settings, keys P2PE Enabled Devices P2PE Secured Transactions Single Site with Management Excrypt SSP9000
  • 15. Primary HSM Site Gateway Host Securus Connections TLS/SSL encrypted P2PE Enabled Devices P2PE Secured Transactions Single Site Basic Excrypt SSP9000
  • 16. Exceptional Support • Extremely knowledgeable TR-39-certified subject matter experts • 24x7x365 Business Critical support • Level 1 to Level 3 support • Xceptional Support Services • Training (virtual or onsite) • Customized consulting • Hosted solutions • Certificate authority • PIN & key generation, printing and mailing • Customized hardware and software solution development
  • 17. People, Process & Technology 17 Compliance and Fraud Prevention People CTGA Certified Solutions Architects Quality Assurance Xceptional 24x7 Global Support Custom Engineering Process On-Site & Virtual Training On-site Implementation Process Consulting Procedure Documentation Technology FIPS 140-2 Level 3 & PCI HSM Key Lifecycle Management EMV and P2PE Tamper Resistant Enterprise Platform