VeriFone and First Data Bring End-to-End Encryption and Tokenization to Gas Stations and …

Integration meets petroleum merchants need for enhanced data security

San Jose, Calif. VeriFone Systems, Inc. (NYSE: PAY) and First Data Corporation announced today the launch of the VeriFone edition of the First Data TransArmor solution for U.S. multi-lane and petroleum merchants. The TransArmor, VeriFone edition, is an end-to-end encryption and tokenization solution that is a result of a partnership between VeriFone and First Data to address retailers need for enhanced payment security.

The TransArmor, VeriFone edition, enables First Data customers using VeriFone's Secure PumpPay and MX series of EMV and NFC-enabled devices to take advantage of a complete security solution combining VeriFone's VeriShield encryption along with tokenization technology from RSA, the Security Division of EMC. Cardholder data benefits from increased protection 'in-flight' from the moment it enters the merchant environmentwhether indoors or at the pumpall the way to First Datas data center, utilizing VeriFone's hardware fortified and format preserving encryption technology.

"Data breaches are a widespread problem with over 1.1 billion records compromised in the last 10 years and the average organizational cost estimated at $5.4 million1," said Paul Kleinschnitz, senior vice president, Cyber Security Solutions, First Data. "This partnership with VeriFone on the TransArmor solution illustrates our commitment to collaborate with industry experts to bring best-in-class security solutions to new markets such as petro."

Two petroleum and convenience retailers, including Robinson Oil Corporation and a major U.S.-based brand of filling stations, will pilot the solution for end-to-end encryption and tokenization of cardholder data captured at the counter and at the pump, beginning in July 2014.

"Petroleum and convenience store retailers have been increasingly focused on bolstering payment security, especially in light of recent breaches in the headlines," said Tom Robinson, president of Robinson Oil Corporation, which will roll out the TransArmor, VeriFone edition across its 34 Rotten Robbie retail locations following the pilot. "As a result of First Data and VeriFones solution, we now have the means to enhance cardholder data protection long before the 2017 EMV deadlines take effect for transactions at gas pumps.

"Being the first to bring end-to-end encryption and tokenization to the petro space, especially in a way that enhances security at the pumpan unattended site vulnerable to the types of attacks seen in recent headlinesdemonstrates VeriFone and First Datas commitment to addressing security needs beyond encryption," said Dan Yienger, senior vice president and general manager of Petroleum for VeriFone. "This solution enhances our offerings to the retail petroleum industry while serving as a testament to our leadership in payment security innovation."

To secure data 'at rest,' the solution has been engineered with RSA tokenization technology that replaces card data with a token number that preserves the value of card data for merchant business operations but removes value for fraudsters. When implementing the TransArmor solution, merchants will meet or exceed existing industry guidelines and requirements for end-to-end encryption and tokenization of payment card data regardless of their unique environment.

1 Ponemon Institute, 2013 Cost of a Data Breach Study, May 2013; Verizon RISK Team, 2013 Data Breach Investigation Report, April 2013

About First Data (www.firstdata.com)

Read the original:
VeriFone and First Data Bring End-to-End Encryption and Tokenization to Gas Stations and ...

11 reasons encryption is (almost) dead

Everyone who has studied mathematics at the movie theater knows that encryption is pretty boss. Practically every spy in every spy movie looks at an encrypted file with fear and dread. Armies of ninjas can be fought. Bombs can be defused. Missiles can be diverted. But an encrypted file can only be cracked open with the proper key -- and that key is always in the hands of a dangerously attractive agent hidden in a sumptuous hideout on the other side of the world. (Never in Newark or New Haven -- who wants to film there?)

Alas, this theorem of encryption security may be accepted as proven by math geniuses at Hollywood U., but reality is a bit murkier. Encryption isn't always perfect, and even when the core algorithms are truly solid, many other links in the chain can go kablooie. There are hundreds of steps and millions of lines of code protecting our secrets. If any one of them fails, the data can be as easy to read as the face of a five-year-old playing Go Fish.

[ Verse yourself in the 7 sneak attacks used by today's most devious hackers, 14 dirty IT security consultant tricks, 9 popular IT security practices that don't work, and 10 crazy security tricks that do. | Build and deploy an effective line of defense against corporate intruders with InfoWorld's Encryption Deep Dive PDF expert guide. Download it today! | Learn how to protect your systems with Roger Grimes' Security Adviser blog. ]

InfoWorld - Everyone who has studied mathematics at the movie theater knows that encryption is pretty boss. Practically every spy in every spy movie looks at an encrypted file with fear and dread. Armies of ninjas can be fought. Bombs can be defused. Missiles can be diverted. But an encrypted file can only be cracked open with the proper key -- and that key is always in the hands of a dangerously attractive agent hidden in a sumptuous hideout on the other side of the world. (Never in Newark or New Haven -- who wants to film there?)

Alas, this theorem of encryption security may be accepted as proven by math geniuses at Hollywood U., but reality is a bit murkier. Encryption isn't always perfect, and even when the core algorithms are truly solid, many other links in the chain can go kablooie. There are hundreds of steps and millions of lines of code protecting our secrets. If any one of them fails, the data can be as easy to read as the face of a five-year-old playing Go Fish.

[ Verse yourself in the 7 sneak attacks used by today's most devious hackers, 14 dirty IT security consultant tricks, 9 popular IT security practices that don't work, and 10 crazy security tricks that do. | Build and deploy an effective line of defense against corporate intruders with InfoWorld's Encryption Deep Dive PDF expert guide. Download it today! | Learn how to protect your systems with Roger Grimes' Security Adviser blog. ]

Encryption is under assault more than ever -- and from more directions than previously thought. This doesn't mean you should forgo securing sensitive data, but forewarned is forearmed. It's impossible to secure the entire stack and chain. Here are 11 reasons encryption is no longer all it's cracked up to be.

Encryption's weak link No. 1: No proofs -- just an algorithm arms raceThe math at the heart of encryption looks impressive, with lots of superscripts and subscripts, but it doesn't come with any hard and fast proofs. One of the most famous algorithms, RSA, is said to be secure -- as long as it's hard to factor large numbers. That sounds impressive, but it simply shifts the responsibility. Is it truly that hard to factor large numbers? Well, there's no proof that it's hard, but no one knows how to do it right all of the time. If someone figures out a fast algorithm, RSA could be cracked open like an egg, but that hasn't happened yet ... we think.

Encryption's weak link No. 2: Disclosure is the only means of detecting a crackSuppose you figured out how to factor large numbers and crack RSA encryption. Would you tell the world? Perhaps. It would certainly make you famous. You might get appointed a professor at a fancy college. You might even land a cameo on "The Big Bang Theory."

But the encryption-cracking business can be shady. It isn't hard to imagine that it attracts a higher share of individuals or organizations that might want to keep their newfound power secret and use it to make money or extract valuable information.

Read the rest here:
11 reasons encryption is (almost) dead