MN-based Entrust Datacard unveiled the Datacard Artista VHD Retransfer Color Printing module GEN 2. Designed to work inline with the Datacard MX Series card issuance systems, this second generation inline printer module offers on-demand, 600 dpi full-color, edge-to-edge card printing for card and credential programs in the financial, government, retail, loyalty, and healthcare markets.
Moderate percentage point gains in consumer smartwatch adoption can be expected over the next year if the Apple Watch follows historical patterns. It has been widely estimated Apple will ship 15 million Apple Watch devices its first year on the market.
While the first release of Apple Watch will attract gold-standard customers: high income, younger, and extremely engaged in digital banking, payments, and shopping, the second wave of adopters will likely follow in 2016 year, which could be the real test for apple.
LogRhythm announced Noodles & Company deployed its Security Intelligence Platform to meet PCI-DSS compliance requirements, which require very close monitoring and control over credit card information and auditing to prove that such data is protected. LogRhythm’s Security Intelligence Platform stands apart from first-generation log management and SIEM solutions by fully integrating log management, SIEM, file integrity monitoring, host forensics and network forensics with advanced analytics. The solution enables organizations to harness the wealth of security-related information embedded within everyday systems, applications and network log data.
Retailers across Europe predict the mobile phone will overtake the physical store, website and call centre, as the single most important communication channel with customers by 2020, according to new research from MasterCard. Only 3% believe the industry is currently keeping pace with consumer demands for multi-channel retail. This research, conducted amongst 300 leading retailers across Europe, forms part of a new industry report sponsored by MasterCard and written by the Economist Intelligence Unit: “The I Factor: how consumer demand is driving retail innovation”. It heralds the era of the “I-Con” – the smart, omnichannel, omnipotent consumer – and looks at how retailers are innovating to retain competitive edge in a rapidly revolutionised market, whilst setting out a vision of how that market will continue to evolve. It concludes the customer is in the driving seat: One in three retailers cited a more empowered customer (32%), alongside increased choice (competition from other retailers – 37%), as amongst the top causes of change in the retail sector in the past five years.
More than 1,000 commercial banks- 16% of the market-now use the Aptys “PayLOGICS” platform to process payments. The “PayLOGICS” platform is the first and only unified platform to support all aspects of payment processing, including image exchange, ACH, wires, payment archiving, Federal Reserve messages, least cost routing, in-network exchange (INEX) and mobile payments. It is a multi-client, multi-tenant payment processing and archiving solution built for correspondent banks, bankers’ banks, corporate credit unions, and processors. This lets legacy and emerging systems including all payment transactions to interact with each other and be accessed and managed from one central location.
Let’s Get Ready (LGR), a non-profit organization that helps gain college access for low-income and first-generation high school students, is proud to announce its second place finish in the first-ever Chase American Giving Awards, hosted by the Emmy Award-Winning Bob Costas last Saturday on NBC. Out of the five finalists, LGR received the second highest amount of votes on the Chase American Giving Awards’ Facebook page, landing them $500,000 in grant money.
Bluepoint Solutions remote deposit capture, item processing and enterprise content management solutions introduced its “ImagePoint Mailroom” solution. The “ImagePoint Mailroom” lets financial institutions capture and electronically process deposits and remittances, including credit card, mortgage, auto and other loan payments, received in the mailroom. The SaaS-based, automated processing tool is designed to scan, sort, apply and split remittances and deposits, validate the data, then export it for clearing, posting and archiving. The web-based application operates in a secure cloud environment with no local software to install or maintain, allowing institutions to quickly deploy the solution with minimal up-front investment.
Mid-Atlantic Corporate Federal Credit Union and Bluepoint Solutions have partnered to assist credit unions with lower check volumes adopt Check 21-enabled branch capture. Bluepoint Solutions RDC and Item Capture solutions will offer its “ImagePoint” Branch capture platform for a monthly fee without significant set-up costs. Once scanned, check images will be electronically transported to Mid-Atlantic Corporate’s data center for additional processing and clearing. Mid-Atlantic Corporate and Bluepoint have also initiated a conversion program to help credit unions of any size replace first-generation, legacy branch capture and check processing solutions with Bluepoint’s modern ImagePoi nt Branch platform.
TxVia payment processing has introduced solutions to allow third parties to become processors for prepaid cards. With this, TxVia eliminates the hurdles associated with entering the prepaid card processing business, including cost, time and risk of creating processing platforms. The prepaid platforms no longer require extensive, time-consuming development to meet even the most basic requirements thanks to TxVia offering processors a secure online environment. This environment for developing prepaid platforms provides application development, data storage and other tools essential for a multi-tenanted, massively scalable end-to-end prepaid card processing system. Subsequently, clients can create multiple customized, interoperable platforms to offer a full range of prepaid card products.
Giesecke & Devrient has rolled out the Mobile Security Card SE 1.0 in conjunction with BlackBerry(R) smartphones at the Mobile World Congress from February 15 to 18, 2010, in Barcelona. Inserted into the microSD card slot on mobile devices, the Mobile Security Card SE 1.0 handles user authentication as well as encryption and signature operations as an independent cryptomodule. In a two-factor process, the user authenticates himself to the Mobile Security Card and only gains access to the mobile device if the information matches. The microSD card can be used for various security scenarios, e.g. for mobile office and banking applications. Providers of independent software can flexibly develop their own security solutions for use with the Mobile Security Card.
On BlackBerry smartphones the card integrates itself in the BlackBerry Device Software 5.0 and handles user-friendly encryption and signature of e-mail traffic and the device memory. With their combination of security and user-friendliness, BlackBerry smartphones featuring this operating system version will provide significant added value in professional corporate use. The Mobile Security Card can also be used with an additional driver software on Smartphones using the BlackBerry Device Software 4.5.
Data encryption provider nuBridges seeks to bolster encryption key management. A byproduct of encryption is a generation of encryption keys that allow authorized users and applications to lock and unlock the data, all of which need to be managed and protected on an enterprise level. According to Trust Catalyst Principal Kimberly Getgen in a 2009 report on encryption and key management1, âEight percent of organizations have experienced problems with lost encryption keys, creating security concerns (50 percent), causing data to be permanently destroyed (39 percent), or disrupting the business (39 percent), while 19 percent of respondents said they directly lost business.â The 2009 Trust Catalyst report also shows that ârotating keys, decrypting and re-encrypting dataâ is the most difficult aspect of key management, according to the survey. In 2008, it was considered the second most difficult aspect, following âpreparing for the unfortunate publicity and impact of data breach,â illustrating the rise of encryption key management anxiety among data security professionals.
One publicized mishap concerning backing up keys occurred last summer.
On July 9, The H, a European online security publication, reported that Germanyâs first-generation electronic health cards and doctorâs âhealth professional cardsâ had suffered a serious setback because it was revealed that the private keys had not been backed up and the production ones had become corrupted. Had this not been a test run of the technology, this oversight in key management best practices would have meant that real data would have been erased.