Protect your customers and your reputation
The layered approach to data security can be the most effective way to combat fraud, which is why Elavon offer a range of easy to implement tools to keep transactions secure and businesses running smoothly. Elavon’s encryption and tokenization solutions provide layers of protection, when used in combination with EMV and PCI-DSS compliance; to ensure you’re doing all you can for your customers to protect cardholder data from increasingly complex and evolving security threats. Additionally, an appropriately implemented encryption and tokenization solution can help reduce the complexity when complying with the PCI-DSS standards and decreases some of the scope and costs of PCI-DSS audits helping you provide your customers with a secure way to accept payments and drive their business forward.
How it works
Encryption: Encryption is the strongest protection for card data when it’s in transit. From the moment a payment card is swiped, inserted (dipped) or contactlessly presented at a terminal featuring a hardware-based, tamper resistant security module, encryption protects the card data from fraudsters as it travels across various systems and networks until it is decrypted at Elavon’s secure data center. Encryption is ideally suited for any businesses that process card transactions in a face-to-face or card-present environment. Elavon’s encryption solution features format-preserving encryption, which retains the original length and structure of card track data, minimizing or eliminating adverse impact to POS systems or message formats.
Tokenization: Tokenization is the key to protecting card data when it’s in-use and at-rest. It converts or replaces cardholder data with a unique token ID to be used for subsequent transactions. This eliminates the possibility of having card data stolen because it no longer exists within the POS or PMS environment. Tokens can be used in card-not present environments such as e-commerce or mail order/telephone order (MOTO), or in conjunction with encryption in card-present environments. Tokens can reside within a POS or PMS, or within an e-commerce infrastructure (at rest) and can be used to make adjustments, add new charges, make reservations, perform recurring transactions, or perform other transactions (in use).
Markets: Lodging, Restaurant, Retail, e-Commerce, and Mail/Telephone Order