SlideShare una empresa de Scribd logo
1 de 22
Small Site PCI DSS Network Security Service Provider N  E  T  W  O  R  K  S
TM Why PCI DSS The Payment Card Industry have responded to the sharp growth of credit card fraud, identity theft and other credit card associated crimes by developing a security standard for all users of their services.
TM Repercussions of  Non-Compliance Failing to comply with the mandatory PCI DSS requirements is not an option for ongoing credit card acceptance.  Non-compliance will result in a range of penalties imposed by the Payment Card Industry to the Acquirer.  The penalties include fines, restrictions and the possible loss of ability to accept card payments.
What is the Mako System? TM ,[object Object],[object Object],[object Object],[object Object],[object Object]
Transition to IP? TM ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],Securing Payment Gateway Connectivity TM
Mako System & PCI DSS TM ,[object Object]
Mako System & PCI DSS TM ,[object Object]
[object Object],[object Object],[object Object],Controlling Devices on the POS Network TM
[object Object],[object Object],Controlling Terminal Connectivity TM
TM Maintaining PCI DSS Compliance with Mako The Mako System ensures that merchants  remain  compliant PCI status reporting Proactive alerts advise when a merchant is at risk of  breaching PCI DSS compliance
Importance of Using Mako  in Achieving Compliance The  Mako System  addresses   100%   of  the  Network Security  requirements under the PCI DSS No other security vendor does this Additionally the Mako System assists compliance in the documentation process TM
Mako QSA Bundle ,[object Object],[object Object],TM
TM Card-Present Merchants Meeting PCI DSS Compliance
TM Card-Present Merchants Meeting PCI DSS Compliance
PCI DSS Network  Vendor Comparison - Day 1 TM
PCI DSS Network  Vendor Comparison - Day 90* TM * With no on-site visits or engineering costs
[object Object],[object Object],[object Object],[object Object],[object Object],TM Meeting PCI DSS Compliance ,[object Object],[object Object],[object Object],[object Object]
Miscommunication About Gaining Compliance TM ,[object Object],[object Object],[object Object]
[object Object],TM Maximise Internet Productivity and Minimise Associated Costs PCI POS S/W Terminals Payment Gateway Firewall Policies A/V Protect Stored Data Track & Monitor
TM ,[object Object],[object Object],[object Object],[object Object],Benefits of the Mako System in PCI DSS Compliance
N  E  T  W  O  R  K  S

Más contenido relacionado

La actualidad más candente

Chapter 10 stored value facilities
Chapter 10   stored value facilitiesChapter 10   stored value facilities
Chapter 10 stored value facilitiesQuan Risk
 
Buffalo Presentation
Buffalo PresentationBuffalo Presentation
Buffalo Presentationbhayden
 
Evolve Pci Compliance
Evolve   Pci ComplianceEvolve   Pci Compliance
Evolve Pci Compliancehypknight
 
Security Professional Online Workshop: ATM and Teller Integration
Security Professional Online Workshop: ATM and Teller IntegrationSecurity Professional Online Workshop: ATM and Teller Integration
Security Professional Online Workshop: ATM and Teller Integration3VR Inc.
 
Verifi Protect Your Payments, Boost Your Profits...across the entire payments...
Verifi Protect Your Payments, Boost Your Profits...across the entire payments...Verifi Protect Your Payments, Boost Your Profits...across the entire payments...
Verifi Protect Your Payments, Boost Your Profits...across the entire payments...Kimmy Luu
 
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...Ingenico Group
 
Cardholder Dispute Resolution Network by Verifi
Cardholder Dispute Resolution Network by VerifiCardholder Dispute Resolution Network by Verifi
Cardholder Dispute Resolution Network by VerifiKimmy Luu
 
XMS General Presentation by BSC
XMS General Presentation by BSCXMS General Presentation by BSC
XMS General Presentation by BSCsgeilfus
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom FraudJeraSoft
 
XMS Presentation
XMS PresentationXMS Presentation
XMS Presentationsvancutsem
 
5 Reasons Why 3VR VIP Is Better Than a DVR
5 Reasons Why 3VR VIP Is Better Than a DVR5 Reasons Why 3VR VIP Is Better Than a DVR
5 Reasons Why 3VR VIP Is Better Than a DVRNick Wooler
 
Will Usage Based Insurance (UBI) disrupt the insurance industry?
Will Usage Based Insurance (UBI) disrupt the insurance industry?Will Usage Based Insurance (UBI) disrupt the insurance industry?
Will Usage Based Insurance (UBI) disrupt the insurance industry?Mateusz Maj
 
The Benefits of Blockchain for eCommerce
The Benefits of Blockchain for eCommerceThe Benefits of Blockchain for eCommerce
The Benefits of Blockchain for eCommerceFito Benitez
 
210224 jp stripes connect deep-dive
210224 jp stripes   connect deep-dive210224 jp stripes   connect deep-dive
210224 jp stripes connect deep-diveNoz Sasaoka
 
YESpay Corporate Presentation 2009
YESpay Corporate Presentation 2009YESpay Corporate Presentation 2009
YESpay Corporate Presentation 2009guest3e40ef
 

La actualidad más candente (19)

Chapter 10 stored value facilities
Chapter 10   stored value facilitiesChapter 10   stored value facilities
Chapter 10 stored value facilities
 
Buffalo Presentation
Buffalo PresentationBuffalo Presentation
Buffalo Presentation
 
Evolve Pci Compliance
Evolve   Pci ComplianceEvolve   Pci Compliance
Evolve Pci Compliance
 
Binary options
Binary optionsBinary options
Binary options
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Security Professional Online Workshop: ATM and Teller Integration
Security Professional Online Workshop: ATM and Teller IntegrationSecurity Professional Online Workshop: ATM and Teller Integration
Security Professional Online Workshop: ATM and Teller Integration
 
Verifi Protect Your Payments, Boost Your Profits...across the entire payments...
Verifi Protect Your Payments, Boost Your Profits...across the entire payments...Verifi Protect Your Payments, Boost Your Profits...across the entire payments...
Verifi Protect Your Payments, Boost Your Profits...across the entire payments...
 
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
PCI at the POS / What’s New, What’s Next, and What Merchants Can Do to Simpl...
 
Cardholder Dispute Resolution Network by Verifi
Cardholder Dispute Resolution Network by VerifiCardholder Dispute Resolution Network by Verifi
Cardholder Dispute Resolution Network by Verifi
 
M commerce
M commerceM commerce
M commerce
 
XMS General Presentation by BSC
XMS General Presentation by BSCXMS General Presentation by BSC
XMS General Presentation by BSC
 
How to Prevent Telecom Fraud
How to Prevent Telecom FraudHow to Prevent Telecom Fraud
How to Prevent Telecom Fraud
 
XMS Presentation
XMS PresentationXMS Presentation
XMS Presentation
 
5 Reasons Why 3VR VIP Is Better Than a DVR
5 Reasons Why 3VR VIP Is Better Than a DVR5 Reasons Why 3VR VIP Is Better Than a DVR
5 Reasons Why 3VR VIP Is Better Than a DVR
 
Will Usage Based Insurance (UBI) disrupt the insurance industry?
Will Usage Based Insurance (UBI) disrupt the insurance industry?Will Usage Based Insurance (UBI) disrupt the insurance industry?
Will Usage Based Insurance (UBI) disrupt the insurance industry?
 
The Benefits of Blockchain for eCommerce
The Benefits of Blockchain for eCommerceThe Benefits of Blockchain for eCommerce
The Benefits of Blockchain for eCommerce
 
210224 jp stripes connect deep-dive
210224 jp stripes   connect deep-dive210224 jp stripes   connect deep-dive
210224 jp stripes connect deep-dive
 
YESpay Corporate Presentation 2009
YESpay Corporate Presentation 2009YESpay Corporate Presentation 2009
YESpay Corporate Presentation 2009
 
Semi-Integrated Solution
Semi-Integrated SolutionSemi-Integrated Solution
Semi-Integrated Solution
 

Destacado

Experience for implement PCI DSS
Experience for implement PCI DSS  Experience for implement PCI DSS
Experience for implement PCI DSS Nhat Phan Canh
 
Achieving PCI-DSS compliance with network security implementations - April 2011
Achieving PCI-DSS compliance with network security implementations - April 2011Achieving PCI-DSS compliance with network security implementations - April 2011
Achieving PCI-DSS compliance with network security implementations - April 2011EQS Group
 
White Paper - Pixel Pitch 5192014
White Paper - Pixel Pitch 5192014White Paper - Pixel Pitch 5192014
White Paper - Pixel Pitch 5192014Brett Farley
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperShaun O'keeffe
 
Building PCI Compliance Solution on AWS - Pop-up Loft Tel Aviv
Building PCI Compliance Solution on AWS - Pop-up Loft Tel AvivBuilding PCI Compliance Solution on AWS - Pop-up Loft Tel Aviv
Building PCI Compliance Solution on AWS - Pop-up Loft Tel AvivAmazon Web Services
 
PCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualPCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualKimberly Simon MBA
 

Destacado (10)

Experience for implement PCI DSS
Experience for implement PCI DSS  Experience for implement PCI DSS
Experience for implement PCI DSS
 
Achieving PCI-DSS compliance with network security implementations - April 2011
Achieving PCI-DSS compliance with network security implementations - April 2011Achieving PCI-DSS compliance with network security implementations - April 2011
Achieving PCI-DSS compliance with network security implementations - April 2011
 
White Paper - Pixel Pitch 5192014
White Paper - Pixel Pitch 5192014White Paper - Pixel Pitch 5192014
White Paper - Pixel Pitch 5192014
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - Whitepaper
 
Snort IPS
Snort IPSSnort IPS
Snort IPS
 
Building PCI Compliance Solution on AWS - Pop-up Loft Tel Aviv
Building PCI Compliance Solution on AWS - Pop-up Loft Tel AvivBuilding PCI Compliance Solution on AWS - Pop-up Loft Tel Aviv
Building PCI Compliance Solution on AWS - Pop-up Loft Tel Aviv
 
PCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualPCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as Usual
 
Firewalls
FirewallsFirewalls
Firewalls
 

Similar a Mako PCI Presentation

How To Sell PCI Compliance (External)
How To Sell PCI Compliance (External)How To Sell PCI Compliance (External)
How To Sell PCI Compliance (External)Greg Naderi
 
101007 How To Sell Pci Compliance (External)
101007 How To Sell Pci Compliance (External)101007 How To Sell Pci Compliance (External)
101007 How To Sell Pci Compliance (External)Greg Naderi
 
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantMelanie Beam
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Merchants
 
Out of Scope Whitepaper
Out of Scope WhitepaperOut of Scope Whitepaper
Out of Scope WhitepaperMark Moreno
 
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce FraudLisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce FraudKnowledge Group
 
ConnectM Corporate Overview (jan 2014)
ConnectM Corporate Overview (jan 2014)ConnectM Corporate Overview (jan 2014)
ConnectM Corporate Overview (jan 2014)Abhijay Sisodia
 
FreedomPay_Whitepaper_Solutions_For_Hospitality
FreedomPay_Whitepaper_Solutions_For_HospitalityFreedomPay_Whitepaper_Solutions_For_Hospitality
FreedomPay_Whitepaper_Solutions_For_HospitalityJeff Vogel
 
Visa Compliance Mark National Certification
Visa Compliance Mark National CertificationVisa Compliance Mark National Certification
Visa Compliance Mark National CertificationMark Pollard
 
PCI DSS Compliance. Shop Direct; A Case Study.
PCI DSS Compliance. Shop Direct; A Case Study. PCI DSS Compliance. Shop Direct; A Case Study.
PCI DSS Compliance. Shop Direct; A Case Study. Compliance3
 
Educause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptxEducause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptxgealehegn
 
Cloud Based POS Streamlining Shopping Experience
Cloud Based POS Streamlining Shopping ExperienceCloud Based POS Streamlining Shopping Experience
Cloud Based POS Streamlining Shopping ExperienceGleecusTechlabs1
 
The Path to Payment Security
The Path to Payment SecurityThe Path to Payment Security
The Path to Payment SecurityTom Cooley
 
Semi-Integrated Payments / A Simplified Approach to EMV & PCI
Semi-Integrated Payments / A Simplified Approach to EMV & PCISemi-Integrated Payments / A Simplified Approach to EMV & PCI
Semi-Integrated Payments / A Simplified Approach to EMV & PCIIngenico Group
 

Similar a Mako PCI Presentation (20)

How To Sell PCI Compliance (External)
How To Sell PCI Compliance (External)How To Sell PCI Compliance (External)
How To Sell PCI Compliance (External)
 
101007 How To Sell Pci Compliance (External)
101007 How To Sell Pci Compliance (External)101007 How To Sell Pci Compliance (External)
101007 How To Sell Pci Compliance (External)
 
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain Media
 
Out of Scope Whitepaper
Out of Scope WhitepaperOut of Scope Whitepaper
Out of Scope Whitepaper
 
PruebaJLF.pptx
PruebaJLF.pptxPruebaJLF.pptx
PruebaJLF.pptx
 
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce FraudLisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
Lisa Shipley (Fraud & AML Stream)- Extending the PCI Boundary to Reduce Fraud
 
ConnectM Corporate Overview (jan 2014)
ConnectM Corporate Overview (jan 2014)ConnectM Corporate Overview (jan 2014)
ConnectM Corporate Overview (jan 2014)
 
FreedomPay_Whitepaper_Solutions_For_Hospitality
FreedomPay_Whitepaper_Solutions_For_HospitalityFreedomPay_Whitepaper_Solutions_For_Hospitality
FreedomPay_Whitepaper_Solutions_For_Hospitality
 
Apani PCI-DSS Compliance
Apani PCI-DSS ComplianceApani PCI-DSS Compliance
Apani PCI-DSS Compliance
 
Visa Compliance Mark National Certification
Visa Compliance Mark National CertificationVisa Compliance Mark National Certification
Visa Compliance Mark National Certification
 
PCI DSS
PCI DSSPCI DSS
PCI DSS
 
PCI DSS Compliance. Shop Direct; A Case Study.
PCI DSS Compliance. Shop Direct; A Case Study. PCI DSS Compliance. Shop Direct; A Case Study.
PCI DSS Compliance. Shop Direct; A Case Study.
 
Educause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptxEducause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptx
 
hSenid - Company Presentation 2009
hSenid - Company Presentation 2009hSenid - Company Presentation 2009
hSenid - Company Presentation 2009
 
PaySecure Connect: Introduction to PCI-certified payment routing infrastructure
PaySecure Connect: Introduction to PCI-certified payment routing infrastructurePaySecure Connect: Introduction to PCI-certified payment routing infrastructure
PaySecure Connect: Introduction to PCI-certified payment routing infrastructure
 
Cloud Based POS Streamlining Shopping Experience
Cloud Based POS Streamlining Shopping ExperienceCloud Based POS Streamlining Shopping Experience
Cloud Based POS Streamlining Shopping Experience
 
Sage Pay Pci Presentation (2
Sage Pay Pci Presentation (2Sage Pay Pci Presentation (2
Sage Pay Pci Presentation (2
 
The Path to Payment Security
The Path to Payment SecurityThe Path to Payment Security
The Path to Payment Security
 
Semi-Integrated Payments / A Simplified Approach to EMV & PCI
Semi-Integrated Payments / A Simplified Approach to EMV & PCISemi-Integrated Payments / A Simplified Approach to EMV & PCI
Semi-Integrated Payments / A Simplified Approach to EMV & PCI
 

Mako PCI Presentation

  • 1. Small Site PCI DSS Network Security Service Provider N E T W O R K S
  • 2. TM Why PCI DSS The Payment Card Industry have responded to the sharp growth of credit card fraud, identity theft and other credit card associated crimes by developing a security standard for all users of their services.
  • 3. TM Repercussions of Non-Compliance Failing to comply with the mandatory PCI DSS requirements is not an option for ongoing credit card acceptance. Non-compliance will result in a range of penalties imposed by the Payment Card Industry to the Acquirer. The penalties include fines, restrictions and the possible loss of ability to accept card payments.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11. TM Maintaining PCI DSS Compliance with Mako The Mako System ensures that merchants remain compliant PCI status reporting Proactive alerts advise when a merchant is at risk of breaching PCI DSS compliance
  • 12. Importance of Using Mako in Achieving Compliance The Mako System addresses 100% of the Network Security requirements under the PCI DSS No other security vendor does this Additionally the Mako System assists compliance in the documentation process TM
  • 13.
  • 14. TM Card-Present Merchants Meeting PCI DSS Compliance
  • 15. TM Card-Present Merchants Meeting PCI DSS Compliance
  • 16. PCI DSS Network Vendor Comparison - Day 1 TM
  • 17. PCI DSS Network Vendor Comparison - Day 90* TM * With no on-site visits or engineering costs
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. N E T W O R K S

Notas del editor

  1. PCI has been designed to help reduce credit card fraud
  2. Small merchants are being fined (upon breach) every month until they comply with PCI Why not just comply with PCI and have no fines if they are breached?
  3. Internet management & productivity solution Connects SME’s & branch offices of larger organisations
  4. Mako enables merchants to easily move from dial-up to Eftpos over IP
  5. Adding a Mako gateway adds security and control Takes the gateway appliance off of the Internet / stops anyone accessing it
  6. Yellow highlights = Covered by Mako’s RoC
  7. Green Highlights = POS network protected by Mako
  8. Any new device has to be authenticated to access the N/W If a device isn’t authenticated it isn’t allowed to access the N/W
  9. Merchants can only connect to a known PCI compliant gateway partner Makes transaction re-directs impossible
  10. Many large merchants have had issues remaining compliant Evan small changes can put you out of compliance. Mako ensures you don’t do it by accident!
  11. Mako system also tracks if a merchants Payment Application is PA DSS compliant
  12. QSA Bundle enables a total solution for the merchant Merchants has to agree to follow and maintain change controls etc...
  13. Passwords / IPSEC keys have to roll every 90 day Mako automate / no other vendor does! Work out the cost (1 hour per week on average?) $150/$200 per hour x 52 weeks = $7,800 / $10,400
  14. Complying with one bit of PCI doesn’t make you compliant. You have to comply with everything.