Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

6/24/2010
08:29 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

BluePay Responds To PCI Deadline With End-To-End Encryption

Merchant account service provider offers solution with tight security and data encryption

CHICAGO, June 23 /PRNewswire/ -- BluePay, a leading credit card processing company that provides advanced payment solutions for small and large businesses, now offers End-to-End Encryption (E2EE) for merchants that must meet requirements for the Card Associations compliance deadline. As of July 1, 2010, to comply with PCI standards all merchants must ensure that the processing equipment and technology they are utilizing is PCI compliant. Merchants must adhere and implement security measures to keep customers' sensitive data safe from fraud. BluePay's E2EE solution provides the tight security and data encryption that merchants need to achieve or increase compliance.

"These PCI requirements are a huge step forward in reducing credit card fraud and increasing customers' security. While merchants may have concerns regarding the immediate costs of security features such as E2EE, they must also keep in mind that they are liable for breaches and fraud that take place due to compromised data from their payment process," said Kristen Gramigna, director of BluePay. "With E2EE, credit card numbers and data is encrypted from the point of sale to authorization and every point in between, not only keeping cardholder data safe, but saving merchants from hefty fines should a theft or breach occur."

By encrypting credit card information during point-of-sale transactions, customers' sensitive data becomes useless to hackers and thieves trying to access credit card numbers while in transit. E2EE keeps data safe throughout the entire payment process, providing a highly advanced and sophisticated form of protection on which consumers and retailers can heavily rely.

In addition to E2EE, BluePay offers security features such as PCI compliant payment gateways, software and data storage facilities, minimizing merchants' risk of liability and increasing customers' safety and confidence.

"At BluePay, we are committed to providing the highest levels of service and security. Our solutions work to streamline the credit card payment process as well as protect customers and merchants from the unfortunate losses that occur through credit card fraud and security breaches," said Gramigna. "We encourage retailers to take every step in complying with PCI standards, and we will help them every step of the way."

About BluePay: Providing the highest level of data security in the industry, BluePay (http://www.bluepay.com) helps local and global merchants to make payment processing simple and fast. BluePay is a full-service, Tier 1 credit card processor based in Naperville, Illinois, with offices and data centers located across the United States. The firm leverages extensive industry experience and a comprehensive suite of credit card merchant account services to provide a complete system of credit card processing solutions with competitive rates.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5230
PUBLISHED: 2019-11-13
P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform...
CVE-2019-5231
PUBLISHED: 2019-11-13
P30 smartphones with versions earlier than ELLE-AL00B 9.1.0.186(C00E180R2P1) have an improper authorization vulnerability. The software incorrectly performs an authorization check when a user attempts to perform certain action. Successful exploit could allow the attacker to update a crafted package.
CVE-2019-5233
PUBLISHED: 2019-11-13
Huawei smartphones with versions earlier than Taurus-AL00B 10.0.0.41(SP2C00E41R3P2) have an improper authentication vulnerability. Successful exploitation may cause the attacker to access specific components.
CVE-2019-5246
PUBLISHED: 2019-11-13
Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain par...
CVE-2010-4177
PUBLISHED: 2019-11-12
mysql-gui-tools (mysql-query-browser and mysql-admin) before 5.0r14+openSUSE-2.3 exposes the password of a user connected to the MySQL server in clear text form via the list of running processes.