1
THE ONGOING THREAT BENEFITS IN ACTION End-to-End Encryption Protects Sensitive Consumer Data “Until now, security was not built into the architecture. Intel® Data Protection Technology for Transactions builds security into the platform. It makes all the difference.” - Erick Kobres | Director of Applied Innovation, NCR Central Management & Updating Whitelisting & Authentication Policy-Driven Access NCR’S DATAGUARD SOLUTION Maintains Solution Integrity Recognizes Trusted Devices Controls Information Paths 1 “The Dangerous World of Counterfeit and Pirated Software” (IDC, 2013); www.microsoft.com/en-us/news/download/presskits/antipiracy/docs/idc030513.pdf. 2 “2014 Data Breach Investigations Report” (Verizon, 2014); www.verizonenterprise.com/DBIR/2014/. 3 www.reuters.com/article/2014/09/18/us-home-depot-dataprotection-idUSKBN0HD2J420140918 4 NPR Interview (http://www.npr.org/2013/12/20/255699203/cybersecurity-forces-u-s-to-examine-technoogical-change), Mr. Peter W. Singer, the Brookings Institution: https://gregorydevans.wordpress.com/tag/cyber-attacks/ No computer system can be absolutely secure. Intel does not assume any liability for lost or stolen data or systems or any damages resulting from such losses. Copyright © 2014 Intel Corporation. All rights reserved. Intel, the Intel logo, Intel Atom, Intel Core, Look Inside., and the Look Inside. logo are trademarks of Intel Corporation in the U.S. and other countries. *Other names and brands may be claimed as the property of others. 1114/SS/MESH/PDF 331410-002US NCR and Intel More Secure Transactions NCR DataGuard™ delivers unprecedented end-to-end protection to safeguard sensitive data http:// NCR Solution Brief Web Video NCR Blog NCR DataGuard and Intel® Data Protection Technology for Transactions Overview Secure I/O in Open Platforms NCR DataGuard™ and Intel® Data Protection Technology for Transactions will be available to protect sensitive non-payment data, as well as payment data in select retail and financial solutions. Creates a secure transaction path from the peripherals, around the POS to the server, end-to-end Service Provider Data Center Bank Transactional Gateway Applet management channel Bank-encrypted card transactions Isolated processing environment for security Trusted Execution Environment + Applet Secure Input Devices Secure channel over USB, WiFi, BLE, etc. Internet NFC radio Mag-stripe EMV contact Bar code Touch Keyboards USD 114 BILLION $ 100 MILLION Credit cards stolen in the last year, along with countless pieces of personal information 3 Enterprise recovery costs from cyber attacks (2013) 1 Data breaches from POS intrusions (2011-2013) 2 31% EVERY 2-3 DAYS Retail security breaches with confirmed data loss (2013) 2 “…We’re discovering between one to nine new pieces of malware every second. And this is basically being written by computers.” 4

NCR’S DATAGUARD SOLUTION - Intel · THE ONGOING THREAT BENEFITS IN ACTION End-to-End Encryption Protects Sensitive Consumer Data “Until now, security was not built into the architecture

Embed Size (px)

Citation preview

“ ”

THE ONGOING THREAT

BENEFITS IN ACTION

End-to-EndEncryption

Protects SensitiveConsumer Data

“Until now, security was not built into the architecture. Intel® Data Protection Technology for Transactions builds security into the platform. It makes all the difference.” - Erick Kobres | Director of Applied Innovation, NCR

Central Management& Updating

Whitelisting &Authentication

Policy-DrivenAccess

NCR’S DATAGUARD SOLUTION

Maintains Solution Integrity

RecognizesTrusted Devices

Controls Information Paths

1 “The Dangerous World of Counterfeit and Pirated Software” (IDC, 2013); www.microsoft.com/en-us/news/download/presskits/antipiracy/docs/idc030513.pdf. 2 “2014 Data Breach Investigations Report” (Verizon, 2014); www.verizonenterprise.com/DBIR/2014/. 3 www.reuters.com/article/2014/09/18/us-home-depot-dataprotection-idUSKBN0HD2J4201409184 NPR Interview (http://www.npr.org/2013/12/20/255699203/cybersecurity-forces-u-s-to-examine-technoogical-change), Mr. Peter W. Singer, the Brookings Institution: https://gregorydevans.wordpress.com/tag/cyber-attacks/No computer system can be absolutely secure. Intel does not assume any liability for lost or stolen data or systems or any damages resulting from such losses.Copyright © 2014 Intel Corporation. All rights reserved. Intel, the Intel logo, Intel Atom, Intel Core, Look Inside., and the Look Inside. logo are trademarks of Intel Corporation in the U.S. and other countries.*Other names and brands may be claimed as the property of others. 1114/SS/MESH/PDF 331410-002US

NCR and IntelMore Secure TransactionsNCR DataGuard™ delivers unprecedented end-to-end protection to safeguard sensitive data

http://

NCRSolution Brief WebVideoNCR Blog

NCR DataGuard and Intel® Data Protection Technology for Transactions Overview Secure I/O in Open Platforms

NCR DataGuard™ and Intel® Data Protection Technology for Transactions will be available to protect sensitive non-payment data, as well as payment data in select retail and financial solutions.

Creates a secure transaction path from

the peripherals, around the POS to the

server, end-to-end

Service ProviderData Center

Bank Transactional Gateway

Applet management channel

Bank-encrypted card transactions

Isolated processing

environment for security

Trusted Execution Environment

+ Applet

Secure Input Devices

Secure channel over USB,

WiFi, BLE, etc.

Internet

NFC radio

Mag-stripe

EMV contact

Bar code

Touch

Keyboards

USD 114 BILLION$100

MILLION

Credit cards stolen in the last year, along with countless pieces of personal information3

Enterprise recovery costsfrom cyber attacks (2013)1 Data breaches from POS

intrusions (2011-2013)2

31%EVERY 2-3 DAYSRetail security breaches with confirmed data loss (2013)2

“…We’re discovering between one to nine new pieces of malware every second. And this is basically being written by computers.” 4