PCI-Compliant Payment Card Processing
Applications

PCI Compliant Payment Card Processing

Securing and protecting the financial services industry with end-to-end transaction security

The lifecycle of each specific card payment transaction can vary depending on a number of factors, however certain processes in the payment transaction lifecycle are fixed in place with a requirement for end-to-end transaction security: authorization, batching, clearing and settlement.

From Merchant’s Points of Sales, mobile devices and ATMs, Utimaco covers the complete chain of PIN encryption, authorization, PIN translation and Key Management through Acquirers, Switches and Issuers, in compliance with PCI-DSS and PCI PTS.

Utimaco’s Atalla Division invented encrypted PIN and ATM messages in the 1970s and has led the evolution of standards and innovation ever since, providing a robust solution for secure, end-to-end transaction processing.

Business value

Business value

Icon

Designed for the Financial Services Industry

  • Enables cryptographic operations to perform PIN translation and verification, card verification, card production and personalization, electronic funds interchange (EFTPOS, ATM), cash-card reloading, EMV transaction processing, and key generation and injection.
  • Provides unrivaled protection for AES and other cryptographic keys safeguarding payment transactions
  • Protects and manages encryption keys needed for payment processing within the tamper-resistant/responsive hardware device.
Icon

Data Security & Compliance

  • Used by global payment leaders and card brands to secure payment ecosystems, achieving the highest level of compliance.
  • Provides superior hardware security to deliver maximum privacy, integrity and performance for host applications
  • PCI PTS Certified for the most demanding application profile, focusing on physical security when used in controlled and uncontrolled environments like non-ISO certified data centers
  • Provides advanced security architecture that prevents retrieval of PINs, keys, and other sensitive data in clear text form
  • Ensures TLS protected and authenticated sessions with host application
  • Provides full multi-domain key and policy enforcement for multiple segregated digital keys per business need while applying policy enforcement to govern the key on the HSM
Icon

Scalable and flexible

  • Gives options for automated and manual key management
  • Encrypted, convenient configuration management: Key loading via Atalla Secure Configuration Assistant (no unenciphered text passing of keys or key components)
  • Integrates with all major payment and switching applications
  • Compatible with previous generation Atalla HSMs
Icon

Remote Access

  • Remote workflow based model
  • Remote Key Loading (RKL)
  • Initialize remote payment devices
  • ATM remote key loading
Icon

Software Simulator included

Included a simulator allowing for evaluation and integration testing to benchmark the best possible solution for each specific case

Contact us

We look forward to answering your questions.

How can we help you?

Talk to one of our specialists and find out how Utimaco can support you today.
You have selected two different types of downloads, so you need to submit different forms which you can select via the two tabs.

Your download request(s):

    By submitting below form you will receive links for your selected downloads.

    Your download request(s):

      For this type of documents, your e-mail address needs to be verified. You will receive the links for your selected downloads via e-mail after submitting below form.

      Your collection of download requests is empty. Visit our Downloads section and select from resources such as data sheets, white papers, webinar recordings and much more. 

      Downloads

       

      0