We’re here to help
GET IN TOUCH
As technology continues to evolve, so too do the risks associated with payment processing. It’s more important than ever to protect your sensitive data from fraud and theft.
paygate comes with a range of tools to help you improve payment security and reduce the risk of fraud.
Our Security Pack offers multi-factor authentication, secure file transfer and anti-fraud functionality to help you boost payment security easily and cost-effectively. Of, if you’re not ready to implement all these features, buy the modules individually to suit your requirements and budget.
Supercharge your payment security and flexibility with the latest multi factor authentication (MFA) capabilities.
Secure file transfer and encryption
Using the latest security protocols and encryptions, automatic file upload imports and validates payment files, protecting file integrity and reducing fraud risk.
Introduces the capability to white and black list accounts, combating fraud risk and avoiding costly errors.
Protect confidentiality by ensuring sensitive data remains confidential during transmission.
Maintain data integrity by ensuring data remains intact and unchanged during file transfer.
Streamline operations by automating file transfers, reducing the need for manual intervention.
Reducing costs by automating file transfers and reducing manual processes errors.
For maximum security, you can set up paygate to ‘watch’ a specific folder or network location where your processing-ready payment files are stored. As soon as paygate detects a new file, it immediately encrypts it, collects it and securely transfers it directly into paygate. It will then be ready for processing as per your procedures. This protects your files, ensures data integrity and helps reduce fraud risk.
Secure file transfer refers to the process of moving files securely from one location to another, typically over a network or the internet. Secure file transfer protocols, such as SFTP (Secure File Transfer Protocol) or HTTPS (Hypertext Transfer Protocol Secure), use encryption to protect the files in transit and prevent unauthorised access, interception, or tampering.
Encryption is the process of converting plain text into coded or scrambled text, so that it becomes unreadable to anyone who doesn’t have the proper key or password to decrypt it. Encryption can be applied to files, emails, or data transmissions to protect their confidentiality and integrity.
MFA stands for Multi-Factor Authentication, which is a security mechanism that requires users to provide two or more forms of authentication in order to gain access to a system, application, or account.
MFA adds an extra layer of security beyond the traditional username and password combination, which can be easily compromised. By requiring multiple factors for authentication, such as a password, physical token or fingerprint, MFA helps to prevent unauthorized access and protect sensitive data.
When a user attempts to access a system that requires MFA, they will be prompted to provide their primary authentication factor, typically a password or PIN. Once this initial factor is verified, the system will prompt them to provide one or more additional authentication factors. The system will then verify each factor provided by the user before granting access to the requested resource.
Passwords : This is the most basic form of MFA, which requires users to provide a password before accessing a system.
Hardware Tokens: Hardware tokens are small devices that generate a unique code that the user must enter to authenticate themselves.
Software-Based Tokens: Software-based tokens are similar to hardware tokens, but instead of being a physical device, they are generated by software on a mobile device, desktop computer, or other device. Software tokens may use a mobile app, a desktop application, or a browser extension to generate and authenticate one-time passwords.
SMS-Based Authentication: This method involves sending a unique code to the user’s mobile phone via SMS. The user must then enter the code on the system they are trying to access.
We offer a variety of MFA options in both paygate v2 and paygate v3. Contact your account manager to discuss the options and get MFA set up.
Black-listing involves explicitly denying access to specific items or entities. For example, a firewall may blacklist certain IP addresses or websites to block traffic from known sources of malicious activity. In this case, any traffic that matches the blacklist is automatically blocked.
Quick response to known threats: Fast and effective way to block known threats, such as malware or known malicious IP addresses.
Flexibility: Allowing organizations to block specific items or entities as needed.
Cost-effective: Providing basic security controls for organizations that have limited resources or budgets.
Whitelisting refers to the practice of explicitly allowing access only to pre-approved items or entities. For example, a network administrator may whitelist certain IP addresses or websites to ensure that only approved traffic is allowed on the network. In this case, any traffic that does not match the pre-approved list is automatically blocked.
To find out more about our enhanced security modules and what’s best for you,
book a call with your Account Manager.