Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

PCI COMPLIANCE: What you Don’t Know CAN Hurt You

By Larry Wine
February 23, 2010

To some people, the idea of crime against merchants seems like the latest Clint Eastwood movie, but the more modern day characterization is the exploitation of customer’s sensitive payment card account data. With this data, hackers can unlock direct access to money and personal identities. Damage can be swift and it’s getting worse before it gets better.
     
According to Databreaches.net, 2009 was the year of the “Mega Data Breach.” the number of personal records that were exposed -- data like Social Security numbers, medical records and credit card information tied to an individual -- that hackers got access to skyrocketed to 220 million records in 2009, compared with 35 million in 2008. That represents the largest collection of lost data on record. At the same time, the average cost per compromised customer record rose to $204 in 2009 from $202 in 2008, according to Ponemon Institute LLC.
     
Luckily, there’s a clear path of action for businesses that can help prevent the compromise of payment card data called the Payment Card Industry Data Security Standard (PCI DSS), which provides guidelines to keep sensitive cardholder data safe from exploitation. Compliance is mandatory for any merchant or business that transmits, processes or stores payment card data. The PCI DSS has undoubtedly made a significant improvement to the security of cardholder account numbers and other sensitive information within the payment card infrastructure.
     
However, complying with PCI DSS should not be considered a silver bullet for protecting information and battling fraud. Consider that many of the companies victimized by data breaches in the past several years were found to be PCI-compliant prior to the breach. When the breach occurred, however, they had unwittingly fallen out of compliance. This puts companies at risk for a breach or an audit resulting in hefty fines that could bring them to their knees. Unfortunately, most find out the hard way.
     
The lesson learned? It’s what merchants don’t know that could end up hurting them along with their business. But there are solutions out there to help merchants stay compliant with less effort. For example, companies can choose to outsource their company data via a tokenization technology to nearly eliminate in some cases, the requirements necessary for a merchant to be PCI DSS compliant. As recent research from industry analyst firm Aberdeen Group attests, “the use of tokenization is strongly correlated with the achievement of Best-in-Class results.”
     
So what is tokenization? The bottom line is that tokenization is a technology that leapfrogs traditional end-to-end encryption.Think of it this way: end-to-end encryption is water resistant; tokenization is water proof. When merchants implement an outsourced tokenization solution, sensitive data is removed from enterprise systems and the technology is complimentary to legacy systems.
     
This technology works by intercepting cardholder data entered into an enterprise payment acceptance system like a Web store, CRM, ERP or POS, and replacing it with a surrogate number known as a “token”, a unique ID created to replace the data associated with a specific card number.
Utilizing tokenization to help with a company’s PCI compliance offers the following two key benefits:
  1. Security: Implementing tokenization via a Software as a Service (SaaS) model ensures no customer card data resides within company systems.  By eliminating the storage of sensitive cardholder data, merchants can realize a multitude of security advantages over traditional enterprise encryption solutions.
  2. Cost effectiveness: A tokenization solution requires minimal upfront capital expenditure and it saves on the back-end by preventing costly breaches. According to Gartner Group, a company with 100,000 customer accounts spends $6 per account to roll out encryption appliances. A separate encryption solution is required for each place where credit card data is stored.  In a large enterprise there can easily be 10 or 20 systems. In contrast, by transferring all card holder data out of your systems, a company eliminates capital expenditures. It’s a simple premise: the less data there is onsite the less it costs to keep it secure.  
In short, being PCI compliant isn’t something that merchants should take for granted. It’s too easy to fall out of compliance and not know it, leaving your systems open to ill-will hackers. But with the right tokenization technology, companies can spend less time on compliance and feel confident in the security of their card holder data, taking a merchant beyond PCI Compliance…helping executives sleep better at night.
 
About Larry Wine
Mr. Wine is an electronic payments industry subject matter expert with more than 20 years of top-level, global executive leadership experience.  As President and CEO of Paymetric, Inc., Mr. Wine is responsible for increasing stakeholder value through strategic, operational, financial and resource excellence.  In his first year with the company, Mr. Wine spearheaded a new strategic vision that positioned Paymetric as the global leader in integrated and secure ePayment processing for ERP systems. He has successfully led the transformation of Paymetric’s business model from a licensed payment integration software company to a Software-as-a-Service ePayment processing company. Prior to joining Paymetric, Mr. Wine was President and CEO of RBS Lynk, where he was responsible for the strategic leadership and executive management of the U.S. acquiring business.  
 
About Paymetric
Paymetric, Inc. is the leading provider of integrated and secure electronic payment acceptance solutions that enable companies to streamline the order-to-cash process, reduce the scope and financial burden of achieving PCI compliance and improve return on electronic payment acceptance. Paymetric’s solutions support virtually every type of electronic payment in any enterprise system where payment is accepted. Paymetric is recognized as an industry leader and is a three-time award-winning SAP certified partner. Visit www.paymetric.com for additional information.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • compliance-freepik1170x658v46.jpg

    What you don’t know about compliance can hurt you

    See More
  • insider threats

    Tinker Tailor Business Spy: What entrepreneurs don’t know (that can hurt them)

    See More
  • What You Don’t Know Could Get You Fired

    See More

Related Products

See More Products
  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing