Securing Case desk Systems
Retail

Securing Cash Desk Systems

Secure operation of cash desk systems for reliable transaction security and optimal customer experience.

Reliable and secure operation of cash desk systems at the point of sale is crucial. Digitally operated and connected to central systems, cash desk systems are vulnerable to attacks if not adequately protected.

The importance of their security is not limited to cashless payments made with bank or credit cards or via mobile devices. Even a checkout accepting cash payments cannot be carried out if the system of the cash desk is unable to obtain the price of items.

Another key factor why cash desk system security is highly important is the security of information and data. Performing cashless payments means transferring and exchanging data from the point of sale to the payment processor, bank and back, in order to approve or deny the transaction.

Ensuring that this data is secured and protected via specific mechanisms such as tokenization. Furthermore, ensuring the trustworthiness of payment terminals and other devices, systems and software digitally connected in the resellers IT infrastructure is paramount.

UTIMACO provides the appropriate solutions for securing all checkout endpoints, the entire cash desk system, and customer payment data.

Applications

Applications for Securing Cash Desk Systems in Retail

Icon

Tokenization

Replacing sensitive data with non-sensitive tokens enables secure business operations without sharing sensitive information.

Icon

Key Injection

Secures payment processes and identities of smart devices by injecting keys generated by HSMs.

Icon

Public Key Infrastructures

Establishes trust relationships between connected entities such as devices, networks, applications and users. PKI is a long-proven technology providing the foundation for secure authentication, confidentiality in communication, and the integrity of data generated and exchanged.

Icon

Transaktionssignaturen gemäß Kassensicherungsverordnung

Digitale Grundaufzeichnungen wie Transaktionsdaten von Registerkassen müssen unter Einsatz einer ergänzenden Technischen Sicherheitseinrichtung gegen Manipulationen geschützt werden. Auf kryptographischen Schlüsseln basierende Signaturen schützen die Transaktionen zuverlässig gegen Manipulationen.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more.

      Downloads
      0