{"id":28638,"date":"2016-02-15T05:00:00","date_gmt":"2016-02-15T10:00:00","guid":{"rendered":"https:\/\/goebt.com\/https-blog-cdesolutions-com-2016-02-what-is-p2pe\/"},"modified":"2025-04-02T14:55:45","modified_gmt":"2025-04-02T18:55:45","slug":"what-is-p2pe","status":"publish","type":"post","link":"https:\/\/goebt.com\/what-is-p2pe\/","title":{"rendered":"What is P2PE?"},"content":{"rendered":"<p><span id=\"hs_cos_wrapper_post_body\" class=\"hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text\" style=\"\" data-hs-cos-general-type=\"meta_field\" data-hs-cos-type=\"rich_text\"><\/p>\n<p>&nbsp;<\/p>\n<p> <!--more--><\/p>\n<p><em><strong>As the landscape of electronic payment processing continues to grow and evolve, the amount of consumer financial records available to thieves continues to grow as well.<\/strong><\/em>&nbsp; With the continued prevalence of data breaches, it\u2019s more important than ever to protect the data transmitted during an electronic payment from fraudulent activities.&nbsp; In 2015, there were 781 recorded data breaches that resulted in more than 169 million consumer records being compromised. *&nbsp; After a number of companies both large and small fell victim to these breaches, the focus on payment processing security began to grow.<\/p>\n<p>One positive development in protecting cardholder data is the implementation of a PCI-validated P2PE or Point-to-Point Encryption.&nbsp; But why is P2PE so effective and why does it mean for it to be PCI-validated?&nbsp; We\u2019ll help you understand so you can make the right choice for your organization.<\/p>\n<p><strong>What is P2PE?<\/strong><\/p>\n<p>Traditionally, cardholder data is \u201cin the clear\u201d at some point in the merchant environment.&nbsp; This data is highly susceptible to theft and fraudulent activity.&nbsp; With P2PE, the data is encrypted at the \u201cpoint of interaction\u201d or POI, which is typically the time of a card swipe or key entry.&nbsp; After this, the data can\u2019t be decrypted until it reaches the P2PE solution provider\u2019s secure decryption location.&nbsp; Throughout every step in the payment transaction, the data is secured and protected from security breaches.<\/p>\n<p><strong>Why should it be PCI-validated?<\/strong><\/p>\n<p>The answer to this is actually pretty simple.&nbsp; The PCI Security Standards Council is a global organization that maintains, evolves, and promotes standards for the safety of cardholder data around the world.<br \/> They influence and help guide the work done by those in the payments industry and determine which efforts and developments are truly necessary for protecting cardholder data.&nbsp; When using P2PE technology from a PCI-validated organization, businesses can greatly reduce the time and cost associated with acquiring, implementing, and maintaining card data security.<\/p>\n<p><strong>Why is it so effective?<\/strong><\/p>\n<p>P2PE offers data security that holds strong throughout the entire payment transaction, not just select portions.&nbsp; Because card data is never exposed in the merchants\u2019 POS environment, hackers will have nothing to gain by intruding on the systems or networks.<\/p>\n<p>Without such a high level of security in processing payments, consumer financial data is left either very vulnerable or unprotected altogether.&nbsp; When security breaches happen, the data that is stolen can be used to commit identity theft and fraud on very grand levels.&nbsp; These types of actions, even on smaller levels, can have serious implications on the financial stability and well-being of the individuals that were stolen from.&nbsp; For a merchant, the impact of a breach can literally put them out of business.<\/p>\n<p>When a business falls victim to a data breach, it\u2019s harmed in several different ways.&nbsp; First, it could result in fines from the card associations or lawsuits from government agencies or organizations, and even consumers.&nbsp; There are then costs to cure the breach which of course are more exaggerated in a reactive mode.&nbsp; Experian details the best way to respond to this type of event in their <a href=\"https:\/\/www.experian.com\/assets\/data-breach\/brochures\/response-guide.pdf\" target=\"_blank\" rel=\"noopener\">\u201cData Breach Response Guide\u201d<\/a> and explains just how intense these processes can be.&nbsp; Lastly, consumers will lose their trust in the business.&nbsp; A tarnished reputation with consumers can ultimately ruin a business in some cases.<\/p>\n<p>Instead of worrying so much about recovering from a hacker\u2019s work, businesses are better off taking the proper precautions to protect themselves with payment processing that uses P2PE security.<\/p>\n<p>&nbsp;<\/p>\n<p>*<em>Identity Theft Resource Center<\/em><\/p>\n<p><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;<\/p>\n","protected":false},"author":244,"featured_media":28639,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1],"tags":[232,205,233,218],"class_list":["post-28638","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-important-announcement","tag-encryption","tag-industry-news","tag-p2pe","tag-security"],"_links":{"self":[{"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/posts\/28638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/users\/244"}],"replies":[{"embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/comments?post=28638"}],"version-history":[{"count":1,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/posts\/28638\/revisions"}],"predecessor-version":[{"id":31269,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/posts\/28638\/revisions\/31269"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/media\/28639"}],"wp:attachment":[{"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/media?parent=28638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/categories?post=28638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/goebt.com\/wp-json\/wp\/v2\/tags?post=28638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}