Silicon Valley-based ViVOtech, the leader in Near Field Communication (NFC) mobile payments, loyalty and marketing applications and contactless NFC readers, and Voltage Security, the global leader in end-to-end data protection, today announced that ViVOtech is implementing a Voltage-powered end-to-end encryption point-of-sales (POS) solution in its ViVOpay line of industry-leading contactless NFC payment terminals.
ViVOtech also announced it has joined the Voltage SecureData Open License Program as it dramatically lowers the barrier to implementing end-to-end encryption on POS devices, Electronic Cash Registers (ECRs), mobile payment devices and eCommerce Payment platforms. By using Voltage SecureData, ViVOtech solutions will provide merchants with a wider set of data protection solutions, incorporating end-to-end encryption and tokenization that significantly reduces the Payment Card Industry Data Security Standard (PCI DSS) audit scope and meets or exceeds the recently published Visa Best Practices for Data Field Encryption and Tokenization.
"We are excited to work with Voltage on providing this expanded level of end-to- end security for our merchants and their payment providers. Voltage offers a strong track record of working with leading acquirers and merchants in the payment space," said Mohammed Khan, president and founder of ViVOtech.
"ViVOtech is a leading innovator in the area of contactless and mobile payment systems. At Voltage our goal is to secure the payment stream across all device implementations, including contactless, mobile and other next generation solutions. Our hardware independent technology allows us to work in an easy, seamless way that provides maximum-strength security with a minimum of administrative hassle," said Doug Dwyre, vice president of business development for Voltage Security.
ViVOtech payment solutions are powered by Voltage's breakthrough Format-Preserving EncryptionTM (Voltage FPE) and Voltage Identity-Based EncryptionTM (Voltage IBE) technologies, which dramatically simplify the deployment and administration of encryption and key management, offering the following advantages:
* Cardholder data is encrypted immediately at point of capture and remains protected end-to-end until card hand-off.
* Key management is simplified - no need to inject keys into devices or manually rotate encryption keys.
* End-to-end encryption can be applied across the widest range of form factors.