GS Logo
The Green Sheet, Inc

Please Log in

Banner Ad
View Archives

View flipbook of this issue

Care to Share?

Table of Contents

Lead Story

EMV, four months on

Patti Murphy

Thicken that skin


Industry Update

FTC takes on big data

U.S. adds six Russian banks to OFAC banned list

MasterPass joins Wal-Mart payment mix

New DOT standards reach airport kiosks


The automated ISO

Phablet popularity soars this holiday season

Felix Richter
Statista Inc.

Smarthphone-driven commerce


Choice not chance

Dale S. Laszig
DSL Direct LLC

Will we be Uberized?

Ken Musante
Eureka Payments LLC


Street SmartsSM:
Facts and figures of the MLS

Jeffrey I. Shavitz
TrafficJamming LLC

The M&A market 2016: 10 things to know to best position your business

Adam Hark

Real capabilities of tokenization in mobile payments

David Poole

Termination: The end or a new beginning?

Adam Atlas
Attorney at Law

The high-risk merchant services opportunity

Matt O'Shea
National Bank Services

The time is right for second generation P2PE

Ruston Miles
Bluefin Payment Systems LLC

Company Profile


New Products

Holistic approach to cybersecurity

Next Generation Security Assessment Services
Redhawk Network Security LLC

Future-proof, obsolescence-free POS

CardWare International Inc.


Letter From the Editors

Readers Speak: Much ado about faster payments

Boost Your Biz:Earn respect with your website

ISOMetrics:Online retailer status update

GS Book Notes:Powerful presence, powerful stories

Resource Guide


Skyscraper Ad

The Green Sheet Online Edition

January 25, 2016  •  Issue 16:01:02

previous next

The time is right for second generation P2PE

By Ruston Miles

If 2015 was the year of Europay, MasterCard and Visa (EMV), 2016 will be the year of point-to-point encryption (P2PE). In our fight to prevent data breaches, EMV has a walk-on role. The uncelebrated star of the show is P2PE, a technology that protects against sophisticated malware that has caused 1,400 data breaches in the last two years, including at Target, P.F. Chang's and Home Depot. With increased awareness of the role of P2PE and a new standard that streamlines its adoption for merchants, we will soon see P2PE move to center stage.

With the commotion around the U.S. implementation of chip cards, it's been easy to overlook the fact that EMV is intended only as a single element of the "layered approach": a three-prong technological security strategy that also incorporates tokenization, which protects data at rest in merchant systems, and P2PE, which protects data in transit, particularly at the POS.

Fostering P2PE awareness

EMV cards are important; they prevent counterfeit cards from being used at the POS and so make it harder for fraudsters to use stolen card data. But P2PE is integral to preventing the card data from being stolen in the first place. Many merchants are surprised to learn that without P2PE, card numbers are sent through their terminals' POS systems unencrypted even if EMV chip cards are used, leaving them wide open to attack. This lack of awareness is concerning, because P2PE is the critical technology where POS malware is concerned. It is the element of the layered approach that protects data during the transaction itself. To spur adoption, in 2015, the PCI Security Standards Council updated its standards for P2PE to make adopting it more user-friendly in response to requests from merchants and processors asking for more flexibility.

Many observers, including myself, believe this new standard, which streamlines merchant adoption, has made a good technology excellent. Merchant adoption promises unparalleled protection against malware, and with EMV and tokenization technologies working together, consumer protections will be significantly enhanced.

The PCI SSC's Version 1.0 of the P2PE standard set the bar extremely high. The P2PE assessors were strict to the standard, and getting through nearly 1,000 requirements covering areas of security and logistics that are foreign to payment processors was a significant challenge. For this reason, it was called the "gold standard" by some, but held up as unattainable by others. Some processors spent a year trying to comply only to conclude it wasn't possible to validate their in-market encryption solutions.

Game-changing ease of adoption

Understanding that a standard is only as effective as its adoption, the council gathered feedback which would allow it to create a 2.0 version that would increase ease of adoption without watering down the protections in it. This involved three major changes.

First, it modularized the standard so that a P2PE solution isn't required to audit all solution components at once. A solution provider can now partner with other companies that offer validated components without having to have the entire solution re-audited. This saves time, money and greatly reduces complexity. This is a groundbreaking change that will spur adoption.

The second major change was to allow merchants to create and manage their own P2PE solutions. Merchants indicated they were concerned with processor lock-in: if processors owned the encryption/decryption keys, merchants would be unable to leave their processors for better deals and would lose leverage. Now merchants can create and manage their own P2PE solutions, or choose from various P2PE solution components, in the same way that processors can. This puts merchants in the driver's seat.

The third major change incorporates feedback from the P2PE solution implementations aimed at simplifying logistics, cleaning up gray areas and removing problematic requirements. For example, in the first standard, devices had to be regularly weighed to determine if skimmers or other hardware had been attached. This requirement was difficult to implement and provided little additional security.

In 2016, adoption of Payment Card Industry (PCI)-validated P2PE is easier than most might think, with the new standards allowing far faster validation than before. Many merchants who have purchased payment terminals in the past two years may already have P2PE in their devices and simply not have it configured. An article in The Wall Street Journal noted that Home Depot had terminals and a project in support of P2PE but did not have it turned on when it was breached.

Merchants are learning that technologies such as EMV and P2PE are useful in solving two very different risks. EMV chip cards protect merchants from accepting counterfeit cards at the POS; P2PE protects card data from being exposed to hackers when it is entered into the POS. In light of the deluge of breaches over the past two years, it's clear that while both technologies are important, P2PE is absolutely critical to stem the tide of attacks. So there we have it, 2016: the year of P2PE. For the sake of consumers and the reputations and viability of the merchants who serve them, I hope my prediction turns out to be correct.

Ruston Miles is the Chief Innovation Officer at Bluefin Payment Systems LLC, the first PCI-validated P2PE solution provider in North America. He is a well-known speaker on data security issues. For more information on Ruston Miles or Bluefin, please email

Notice to readers: These are archived articles. Contact names or information may be out of date. We regret any inconvenience.

previous next

Spotlight Innovators:

North American Bancard | Harbortouch | USAePay | Humboldt Merchant Services | Impact Paysystems