First Data & Tokens!!! Notice this phrase from tod
Post# of 82672
"TransArmor Tokenization when at rest
Leverage existing certifications for lowest cost path to P2PE"
From The Advanced Cyber Security website:
January 10, 2019
https://www.advancedcybersecurity.com/
Many PCI professionals, including QSA Auditors and Forensic Examiners, are talking about how keystroke encryption can help raise the level of PCI and strengthen GDPR by protecting network credentials and customer data. PCI DSS 3.2 Requirement 5.1 offers guidance to protect systems from "zero-day" malware (an attack that exploits and unknown vulnerability) by keeping antivirus update regularly. However, malware starts out as "zero-day" until it gets reported to antivirus as a result of a breach. If that zero-day malware is a keylogger, then all of the keystrokes the user inputs prior to discovery, have already been stolen. This includes network access credentials and "Card Not Present" transactions. In addition, keyloggers are extremely difficult to discover because many have polymorphic capabilities, meaning they have the capability to change their form and continue to elude antivirus for months and sometimes years.
Merchants would benefit greatly from using EndpointLock keystroke encryption to protect all of the data they input into a PC or mobile device.
In addition to protecting the merchant and their customers, keystroke encryption also protects the credit card processor and other networks that the merchant must log into in order to perform daily functions such as download reports and viewing their account . If a hacker gains access to these systems, they can plant other malware and work their way further into the enterprise.
Notice this from Strikeforce's website:
https://www.strikeforcetech.com/protectid/
Various Authentication Methods
ProtectID® has a multitude of potential authentications
methods. These methods include:
Out-of-Band Phone – #, PIN, OTP, and/or Voice
OTP Delivery to Phone via MS, Voice, Email, and/or Push
Out-of-Band Push – Accept/Deny, PIN, and/or Fingerprint
Hard Tokens – Key Fob, USB Key, and/or Wallet Cards
Mobile Tokens – iOS, Android, and/or Blackberry
Desktop Tokens – Windows, OS X & MacOS, and/or Linux
Support for FIDO *coming soon*