PAX, one of the world's leading electronic payment system manufacturers, and Voltage Security, the global leader in end-to-end data protection, today announced that PAX is implementing an end-to-end encryption point-of-sales (POS) solution that protects cardholder data at the point of card swipe and through the payment flow to payment processor or card brand hand-off.
By encrypting data at the point of sale, PAX solutions with Voltage SecureData provide merchants with an end-to-end data protection solution that significantly reduces the Payment Card Industry Data Security Standard (PCI DSS) audit scope and meets or exceeds the recently published Visa Best Practices for Data Field Encryption.
PAX has chosen to join the new Voltage SecureData Open License Program because it dramatically lowers the barrier to implementing end-to-end encryption on POS devices, Electronic Cash Registers (ECRs) and eCommerce Payment platforms.
"One of our primary goals is to deliver highly secure and affordable data protection to our customers," said Mike Mulcahy, CEO of PAX. "We chose Voltage as a preferred partner because of their advanced technology and momentum in signing new merchants and payment processors," continued Mulcahy.
"As a global leader in payments solutions, PAX is widely recognized as a payment technology innovator and is committed to raising the data security standards within the electronic payments industry," said Mark Bower, vice president of Product Management for Voltage Security. "By selecting Voltage, PAX is delivering end-to-end security to merchants and their customers around the world," continued Bower.
With PAX solutions, payment card primary account numbers (PANs) and other sensitive data are encrypted at the merchant's point-of-sale device. This protection remains enforced until payment processor or card-brand hand-off.
PAX payment solutions are powered by Voltage's breakthrough Format-Preserving Encryption (Voltage FPE) and Voltage Identity-Based Encryption (Voltage IBE) technologies, which dramatically simplify the deployment and administration of encryption and key management, offering the following advantages:
• Cardholder data is encrypted immediately at point of capture and remains protected end-to-end.
• Key management is simplified - no need to inject keys into devices or manually rotate encryption keys.
• End-to-end encryption can be applied across the widest range of form factors.