Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


03:16 PM
Dark Reading
Dark Reading
Products and Releases

Heartland E3 Adopted By Leading Payments Manufacturers

End-to-end encryption solution provides interoperability

PRINCETON, NJ - March 25, 2010 - Several of the world's leading electronic payments system manufacturers are working with Heartland Payment Systems (NYSE: HPY), one of the nation's largest payments processors, to ensure their point-of-sale (POS) devices and other payments platforms offer the highest level of data security to businesses that accept credit and debit card payments. These manufacturers are integrating Heartland's E3 protocol, an industry-leading end-to-end encryption solution that leverages Voltage SecureData encryption and key management technology. End-to-end encryption is considered the most effective security method available for protecting cardholder data.

E3 uses the strongest encryption methods available to safeguard cardholder data at rest and in motion throughout the lifecycle of payments transactions from the moment of card swipe to and through the payment processor's network to participating card brands. E3 is designed to offer full lifecycle protection, not merely point-to-point like most competing solutions, and render payment data useless in the event of a compromise.

In early 2009, Heartland began working with Voltage Security to develop a comprehensive end-to-end encryption solution that did not exist in the marketplace at that time. E3 is the only security solution that offers comprehensive, layered coverage — including software and hardware. E3 features a tamper-resistant POS terminal, magnetic stripe reader/wedge and other devices and software tools that protect cardholder data and never store it on a business' system, relieving the business of PCI card data liability.

Over the past several months, Heartland has provided leading manufacturers — including strategic partner Uniform Industrial Corporation (UIC), Hypercom, ExaDigm, and others — with the E3 protocol specification.

"Heartland set out to create a new standard and make the highest degree of security available to each and every merchant regardless of size or resources — and without charging them extra fees and taxes for enhanced security. We have taken the lead in the movement for greater security standards in the payments industry, urging industry leaders to work together to fight cyber criminals," said Steve Elefant, Heartland's chief information officer. "As several of the world's leading payments equipment manufacturers move to embrace our E3 protocol, it is a testament to the security, innovation and interoperability of our solution, as well as their commitment to help secure payment data and protect all stakeholders in the payments ecosystem with the most comprehensive security solution available today."

"Hypercom applauds the industry leading position Heartland has adopted and continues to champion for the protection of transaction card data and the provision of true end-to-end security," said T.K. Cheung, vice president, global quality and security, Hypercom Corporation. "Hypercom is committed to supporting Heartland's E3 protocols and platforms."

E3 entered beta testing in June 2009 — which marked the first time encrypted transactions have been sent from a merchant's card reader to and through a major processor's payments network. The E3 solution is currently available in limited release and will be widely available in the second quarter of this year. For more information on E3 — or to download a just-released white paper, "Card Payment Security for the Small Merchant," written by George Peabody of Mercator Advisory Group — visit E3secure.com.

About Heartland Payment Systems Heartland Payment Systems (NYSE: HPY), the 5th largest payments processor in the United States, delivers credit/debit/prepaid card processing, payroll, check management and payments solutions to more than 250,000 business locations nationwide. Heartland is the founding supporter of The Merchant Bill of Rights, a public advocacy initiative that educates merchants about fair credit and debit card processing practices. For more information, please visit HeartlandPaymentSystems.com, MerchantBillOfRights.org, CostOfABurger.com and E3secure.com.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-14
A buffer overflow vulnerability in SonicOS allows a remote attacker to cause a Denial of Service (DoS) by sending a specially crafted request. This vulnerability affects SonicOS Gen5, Gen6, Gen7 platforms, and SonicOSv virtual firewalls.
PUBLISHED: 2021-06-14
magento-scripts contains scripts and configuration used by Create Magento App, a zero-configuration tool-chain which allows one to deploy Magento 2. In versions 1.5.1 and 1.5.2, after changing the function from synchronous to asynchronous there wasn't implemented handler in the start, stop, exec, an...
PUBLISHED: 2021-06-14
net/can/bcm.c in the Linux kernel through 5.12.10 allows local users to obtain sensitive information from kernel stack memory because parts of a data structure are uninitialized.
PUBLISHED: 2021-06-14
Cross-site Scripting (XSS) vulnerability in the main dashboard of Ellipse APM versions allows an authenticated user or integrated application to inject malicious data into the application that can then be executed in a victim’s browser. This issue affects: Hitachi ABB Power Grids ...
PUBLISHED: 2021-06-14
Improper Input Validation vulnerability in Hitachi ABB Power Grids Relion 670 Series, Relion 670/650 Series, Relion 670/650/SAM600-IO, Relion 650, REB500, RTU500 Series, FOX615 (TEGO1), MSM, GMS600, PWC600 allows an attacker with access to the IEC 61850 network with knowledge of how to reproduce the...