PCI Data Security Standard
Safe-T Solo ™
Sixty-seven percent of small businesses experienced a cyber attack and 58% experienced a data breach in 2018.2 Ideal for sole proprietors and smaller businesses, Safe-T Solo is a non-integrated solution that features our triple-layered protection and comes with up to $250,000 of financial assistance in the event that card data is compromised while using Safe-T Solo. This helps to defray card network fines, fees or assessments associated with breaches.
Want simple, yet proficient payments security integration? Safe-T Link is a PCI-validated software application that resides within Elavon payment terminals and easily integrates with POS or PMS systems to provide encryption and tokenization. It supports a variety of terminals without direct coding and eliminates the need for EMV certification. Safe-T Link is EMV-certified and supports contactless payments – including unattended retail environments – with the same level of security as dipping the card.
Safe-T Link with P2PE Protect™
Mitigate the risks of managing payment card data and reassure your customers that you are serious about the safety of their information. A semi-integrated solution, Safe-T Link with P2PE Protect is PCI-validated to soundly protect payment card data, as well as reduce PCI DSS compliance scope. This solution features EMV-capable terminals that authenticate the card at the POS to ensure validity. Simplify® PCI-validated software replaces card data with a token that keeps it safe at rest and for subsequent charges.
WHAT IS PCI?
What type of security threats exist?
Criminals can gain access to your systems that store, process, or transmit payment data through weak remote access controls. Remote access may be used by your payment terminal vendors, for example, to provide support to your terminal or to provide a software update.
Criminals use malicious software to infiltrate a computer system and steal payment data. Ransomware is the fastest growing malware threat.
More than 80% of data breaches involve stolen/or weak passwords.
*Verizon 2017 DBIR
Phishing emails are a common delivery vehicle for malware. These emails look legitimate, such as an invoice or electronic fax, but they include malicious links and/or attachments that can infect your computer and system.
Criminals look for outdated software to exploit flaws in unpatched systems.
Criminals attach small hardware "skimming devices" to card readers which can sweep customer payment data when they use payment cards at your store. Criminals use the stolen data to create counterfeit cards and make illegal purchases.