End-to-end Encryption Security Requirements

The Secure POS Vendors Alliance (SPVA) commissioned the End-to-end Security workgroup to provide clear guidelines on the application of encryption technology to payment card data used for retail financial transactions. This document addresses encrypting payment card data in tamper-resistant security modules.

Featured Software Research:

Must-have ERP Features for the Automotive Industry

This paper summarizes the benefits an enterprise resource planning (ERP) solution provides to the entire manufacturing process, "from shop floor to top floor." Included are key features in a software as a service (SaaS) solution to help an auto manufacturer optimize performance throughout the enterprise. Read More

Reverse Logistics for Service

  • Source: IFS
  • Written By:
  • Published:
Reverse logistics management for service requires specialized software that accounts for many transactions and processes unique to installed base support. By implementing a configurable solution that automates the end-to-end reverse logistics cycle, service organizations can increase productivity, improve the customer experience, and significantly reduce costs. Find out more. Read More

You may also be interested in these related documents:

NIST Certification for AES Encryption

The National Institute of Standards and Technology (NIST) defines the standard for Advanced Encryption Standard (AES) encryption, and provides a rigorous testing process for software vendors. The AES certification process tests every aspect of encryption and involves millions of operations. Discover a solution that has achieved AES validation for all key sizes and modes of operation, on every major enterprise platform. Read More

Understanding the PCI Data Security Standard

The payment card industry data security standard (PCI DSS) defines a comprehensive set of requirements to enhance and enforce payment account data security in a proactive rather than passive way. These include security management, policies, procedures, network architectures, software design, and other protective measures. Get a better understanding of the PCC DSS and learn the costs and benefits of compliance. Read More

PC Encryption: Eyes Wide Open

While the virtues of encrypting PC data are extolled by vendors and the press alike, some painful truths go largely unmentioned. Whether necessary for compliance or state breach disclosure law, or for doing business in a state requiring it, encryption is necessary but difficult. Learn where existing encryption solutions are failing, and find out how emerging tools and trends can make encryption better, and easier. Read More
comments powered by Disqus