Upload
truongkhue
View
214
Download
0
Embed Size (px)
Citation preview
“ ”
THE ONGOING THREAT
BENEFITS IN ACTION
End-to-EndEncryption
Protects SensitiveConsumer Data
“Until now, security was not built into the architecture. Intel® Data Protection Technology for Transactions builds security into the platform. It makes all the difference.” - Erick Kobres | Director of Applied Innovation, NCR
Central Management& Updating
Whitelisting &Authentication
Policy-DrivenAccess
NCR’S DATAGUARD SOLUTION
Maintains Solution Integrity
RecognizesTrusted Devices
Controls Information Paths
1 “The Dangerous World of Counterfeit and Pirated Software” (IDC, 2013); www.microsoft.com/en-us/news/download/presskits/antipiracy/docs/idc030513.pdf. 2 “2014 Data Breach Investigations Report” (Verizon, 2014); www.verizonenterprise.com/DBIR/2014/. 3 www.reuters.com/article/2014/09/18/us-home-depot-dataprotection-idUSKBN0HD2J4201409184 NPR Interview (http://www.npr.org/2013/12/20/255699203/cybersecurity-forces-u-s-to-examine-technoogical-change), Mr. Peter W. Singer, the Brookings Institution: https://gregorydevans.wordpress.com/tag/cyber-attacks/No computer system can be absolutely secure. Intel does not assume any liability for lost or stolen data or systems or any damages resulting from such losses.Copyright © 2014 Intel Corporation. All rights reserved. Intel, the Intel logo, Intel Atom, Intel Core, Look Inside., and the Look Inside. logo are trademarks of Intel Corporation in the U.S. and other countries.*Other names and brands may be claimed as the property of others. 1114/SS/MESH/PDF 331410-002US
NCR and IntelMore Secure TransactionsNCR DataGuard™ delivers unprecedented end-to-end protection to safeguard sensitive data
http://
NCRSolution Brief WebVideoNCR Blog
NCR DataGuard and Intel® Data Protection Technology for Transactions Overview Secure I/O in Open Platforms
NCR DataGuard™ and Intel® Data Protection Technology for Transactions will be available to protect sensitive non-payment data, as well as payment data in select retail and financial solutions.
Creates a secure transaction path from
the peripherals, around the POS to the
server, end-to-end
Service ProviderData Center
Bank Transactional Gateway
Applet management channel
Bank-encrypted card transactions
Isolated processing
environment for security
Trusted Execution Environment
+ Applet
Secure Input Devices
Secure channel over USB,
WiFi, BLE, etc.
Internet
NFC radio
Mag-stripe
EMV contact
Bar code
Touch
Keyboards
USD 114 BILLION$100
MILLION
Credit cards stolen in the last year, along with countless pieces of personal information3
Enterprise recovery costsfrom cyber attacks (2013)1 Data breaches from POS
intrusions (2011-2013)2
31%EVERY 2-3 DAYSRetail security breaches with confirmed data loss (2013)2
“…We’re discovering between one to nine new pieces of malware every second. And this is basically being written by computers.” 4