Payment Transaction Security
Encryption and Tokenization
Protect sensitive cardholder data, whether your customers are using NFC-enabled devices, chip and PIN (EMV) or traditional mag-stripe cards. Provide peace of mind to customers and reduce your PCI compliance scope.
Load encryption keys anytime, anywhere, with no business disruption.
We don’t just adopt payment security standards. We help create them. We are proud to be recognized around the globe for our leadership in payment security.
Encryption & Tokenization
Based on AESCustomer’s account data is encrypted at the point of interaction based on Advanced Encryption Standard (AES).
Multiple DevicesAvailable in most Verifone POS and mobile payment devices, including PIN pads, countertop, multimedia and PAYware Mobile Enterprise.
Multiple TypesSecure data regardless of the payment type: mag-stripe, EMV or NFC.
AsymmetricAsymmetric encryption (PKI) perfectly suited for remote deployment to large numbers of existing terminals.
Provides POS infrastructure flexibility for both merchants and processors.
Trusted PartnerEncrypted data remains secure all the way to the processor, where it is decrypted and sent to the issuer for approval.
Substitution of PANTrue random number data tokenization. No algorithm is required to reverse engineer your credit card tokenization solution.
Data1:1 credit card tokenization mapping for merchants means the same card always returns the same token for chargebacks and to enable analytics.
FormatOur payment tokenization preserves the original transaction format for seamless integration with existing systems.
Monitoring and Compliance
MonitoringMonitor the encryption status of every transaction on every device in real-time.
AlertsImmediate notification of changes to your POS status, location or compliance level.
Merchant RetentionImprove relationships with merchants thanks to instant notification of changes to POS status.
Asset ProtectionMultiple layers of security give you the information and opportunity to retain your merchant relationship.
Compliance AssuranceReal-time information lets you know your current encryption compliance status.
VeriShield Remote Key
Key Injection FlexibilityDownload and deploy new encryption keys on your schedule. VRK supports debit keys, VSS keys, VTP encryption keys and more.
Convenience and SecurityQuickly respond to a suspected security breach, stay current with compliance standards or simply update keys as part of normal operating procedures; VeriShield Remote Key streamlines the critical, process-intensive task of key management.