P2PE Solutions

PCI Compliance Made Easy.

By using a PCI certified P2PE solution, you see a 90% drop in PCI requirements—from 326 questions to 35 instantly. PCI compliance becomes a breeze, saving you time, money, effort, and removing your liability. Our P2PE solution is completely compatible with all of the Intelligent Solutions Gateway, removing all the hassle from your payment processing

Stay Protected.

781 U.S. data breaches.

169 million records exposed.

$217 per record.

Around 90% of all data breaches are through malware, placing any data handled in-house at risk. The PCI Security Standards Council (SSC) calls Point-to-Point Encryption (P2PE) the most effective way to prevent data breaches via malware. Intelligent Contacts, partnered with Bluefin Payment Systems, is equipped with the one of the only PCI certified P2PE solutions. P2PE works by injecting millions of unique encryption keys to each payment processing device and assigning a new key to each transaction before it ever reaches the POS system, network, or any other merchant system, effectively removing your internal network and infrastructure out of scope of PCI.

How Secure Is It?

PCI certified P2PE devices are made for security and designed to detect tampering. If malicious activity is detected, the device is automatically deactivated, preventing a breach at the point of entry (also called point-of-interaction, or POI) device. P2PE also includes a built-in “chain of custody” process for managing certified devices. Partnered with Bluefin Payment Sytems, the Intelligent Contacts P2PE Manager can automatically track and report on all POI devices for PCI compliance review. Merchants that implement Bluefin’s PCI-validated P2PE solution throughout their POS environment are eligible for the 35-question SAQ P2PE-HW – a significant reduction from the 332-question SAQ D. All PCI-validated P2PE solution providers must abide by strict controls to protect encryption keys. Device key injection is done directly at a certified Key Injection Facility (KIF) and decryption only occurs in the Bluefin hardware environment (HSM).

P2PE Features:

  • Manage: Users, Partners, Clients, Locations
  • Devices: Device Deployment, Activation, Termination (end of life)
  • Shipments: Track Device Shipping (chain of custody)
  • History: Transactional, Device, User History
  • Reports: Management, Device, Shipment, Transactional Reports for Exporting/Download

For more information about PCI compliance, visit the PCI Standards Council website here: https://www.pcisecuritystandards.org/document_library

Statistics From ITRC 2015 Data Breach Report and Ponemon Institute/IBM 2015 Cost of Data Breach Study: Global Analysis