Verifone Expands Availability of Secure Commerce Architecture

Verifone announced the global availability of its secure commerce architecture, designed to significantly reduce merchant exposure to large-scale data breaches, and reduce the certification burden on U.S. merchants, acquirers and other payment providers looking to enable EMV acceptance.

Verifone’s secure commerce architecture decouples payment data from the merchant’s point of sale (POS) system (e.g., cash register), and enables encrypted delivery of this data from the payment terminal directly to the merchant’s processor. This provides merchants with two primary benefits:

  • EMV migration in the U.S. will lead to a costly and cumbersome certification process. Historical payment architecture requires certification of each combination of POS system, payment terminal, gateway and acquirer—a costly process for merchants in terms of time and resources. The Verifone secure commerce architecture removes the POS system from the scope of EMV certification, greatly reducing the burden for clients.
  • Large-scale breaches of payment data are undermining retail brands and consumer confidence, and merchants’ POS systems are common targets for cybercriminals. The Verifone secure commerce architecture solves these issues by preventing consumer payment data from entering the POS, thereby eliminating the potential for this data to be stolen at scale.  Instead, card data is encrypted and transmitted directly to the merchant’s payment processor.

Previously only available through the company’s U.S. Payment as a Service offering, this secure commerce architecture is now available to all of Verifone’s direct merchant customers and all merchant acquirers in the U.S. Merchants can utilize this architecture through integration with their merchant acquirer. Global availability will begin in 2015.

“Reducing or eliminating cardholder data breaches must be a priority for any merchant,” said Thad Peterson, senior analyst for Aite Group. “Verifone’s secure commerce architecture is an elegant solution that virtually eliminates that risk with no significant impact on either the merchant’s POS system or the customer experience. Beyond that, if a merchant has yet to adopt EMV, this architecture simplifies the process and speeds implementation by shouldering the administrative burden of EMV certification.”

For Large Merchants

For large global merchants, managing payment complexity requires a substantial investment of time and resources. PCI compliance, the U.S. migration to EMV, and the exposure of PC-based systems to large-scale data breaches are creating a growing burden on retailers’ IT departments. The secure commerce architecture eliminates much of this complexity, significantly reducing the risk of large scale payment data breaches and easing the EMV certification burden. This allows merchants to focus more resources on enriching the customer experience and to enable these innovations at the physical point of sale.

For Acquirers and ISVs

The desire from merchants to leverage the power of an integrated point of sale continues to move downstream to include mid-tier merchants.  For Verifone clients – the acquirers and independent software vendors (ISVs) that serve these merchants – the resulting payment complexity results in slower implementation, and stands in the way of delivering innovative new products and services. The secure commerce architecture frees up acquirers and ISVs to focus on delivering great experiences for their merchants.

“The introduction of this secure commerce architecture through our U.S. Payment as a Service offering has led to substantial interest and demand from both our direct merchant clients, as well as acquirers and POS integrators,” said Robert McMillon, vice president of Product Security for Verifone. “These organizations are looking for a way to stop pouring resources into costly certifications, stop worrying about large-scale data breaches, and focus on delivering incredible consumer commerce experiences.”

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Cloud and Hybrid Adoption on the Rise

    The physical security industry is experiencing a time of great transformation. Cloud connectivity is accelerating, and more organizations are choosing to blend on-premises and cloud-based solutions. This transformation is affecting all aspects of security, including access control. In the Genetec annual State of Physical Security Survey, it was access control that topped the list of new technologies end-users planned to focus on in 2024. Read Now

  • New Report Says Vulnerability Exploitation Boom Threatens Cybersecurity

    Verizon Business recently released the findings of its 17th-annual Data Breach Investigations Report (DBIR), which analyzed a record-high 30,458 security incidents and 10,626 confirmed breaches in 2023—a two-fold increase over 2022. Read Now

  • In The Clouds

    Video data storage in the cloud was a novel concept when Dean Drako founded Eagle Eye Networks back in 2012. While cloud was being used for almost all other business systems at that time, the physical security industry took a cautious and measured approach to cloud adoption. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3