NCR’S DATAGUARD SOLUTION - Intel · THE ONGOING THREAT BENEFITS IN ACTION End-to-End Encryption...

Preview:

Citation preview

“ ”

THE ONGOING THREAT

BENEFITS IN ACTION

End-to-EndEncryption

Protects SensitiveConsumer Data

“Until now, security was not built into the architecture. Intel® Data Protection Technology for Transactions builds security into the platform. It makes all the difference.” - Erick Kobres | Director of Applied Innovation, NCR

Central Management& Updating

Whitelisting &Authentication

Policy-DrivenAccess

NCR’S DATAGUARD SOLUTION

Maintains Solution Integrity

RecognizesTrusted Devices

Controls Information Paths

1 “The Dangerous World of Counterfeit and Pirated Software” (IDC, 2013); www.microsoft.com/en-us/news/download/presskits/antipiracy/docs/idc030513.pdf. 2 “2014 Data Breach Investigations Report” (Verizon, 2014); www.verizonenterprise.com/DBIR/2014/. 3 www.reuters.com/article/2014/09/18/us-home-depot-dataprotection-idUSKBN0HD2J4201409184 NPR Interview (http://www.npr.org/2013/12/20/255699203/cybersecurity-forces-u-s-to-examine-technoogical-change), Mr. Peter W. Singer, the Brookings Institution: https://gregorydevans.wordpress.com/tag/cyber-attacks/No computer system can be absolutely secure. Intel does not assume any liability for lost or stolen data or systems or any damages resulting from such losses.Copyright © 2014 Intel Corporation. All rights reserved. Intel, the Intel logo, Intel Atom, Intel Core, Look Inside., and the Look Inside. logo are trademarks of Intel Corporation in the U.S. and other countries.*Other names and brands may be claimed as the property of others. 1114/SS/MESH/PDF 331410-002US

NCR and IntelMore Secure TransactionsNCR DataGuard™ delivers unprecedented end-to-end protection to safeguard sensitive data

http://

NCRSolution Brief WebVideoNCR Blog

NCR DataGuard and Intel® Data Protection Technology for Transactions Overview Secure I/O in Open Platforms

NCR DataGuard™ and Intel® Data Protection Technology for Transactions will be available to protect sensitive non-payment data, as well as payment data in select retail and financial solutions.

Creates a secure transaction path from

the peripherals, around the POS to the

server, end-to-end

Service ProviderData Center

Bank Transactional Gateway

Applet management channel

Bank-encrypted card transactions

Isolated processing

environment for security

Trusted Execution Environment

+ Applet

Secure Input Devices

Secure channel over USB,

WiFi, BLE, etc.

Internet

NFC radio

Mag-stripe

EMV contact

Bar code

Touch

Keyboards

USD 114 BILLION$100

MILLION

Credit cards stolen in the last year, along with countless pieces of personal information3

Enterprise recovery costsfrom cyber attacks (2013)1 Data breaches from POS

intrusions (2011-2013)2

31%EVERY 2-3 DAYSRetail security breaches with confirmed data loss (2013)2

“…We’re discovering between one to nine new pieces of malware every second. And this is basically being written by computers.” 4