Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Akamai Payment Tokenization Service Helps Secure and Optimize Web Transactions

New Payment Tokenization Service Unveiled for the Akamai Cloud

Akamai Technologies today unveiled an “Edge Tokenization” electronic payment security service that automates credit card tokenization within the Akamai cloud, keeping payment data off the networks of eCommerce providers.

PCI Compliant Cloud Soltutions

New Payment Tokenization Service Unveiled for the Akamai Cloud

Akamai Technologies today unveiled an “Edge Tokenization” electronic payment security service that automates credit card tokenization within the Akamai cloud, keeping payment data off the networks of eCommerce providers.

PCI Compliant Cloud Soltutions

Developed to integrate into retailer’s existing eCommerce environments, the Akamai solution enables credit card data to be converted to a token prior to Web transactions landing on a merchant’s infrastructure. By alleviating the requirement for retailers to route customer credit card data on their own infrastructure, the service helps reduce data theft and compliance risk while lowering PCI DSS compliance costs.

Utlizing Akamai’s cloud infrastructure of tens of thousands of servers, the solution enables credit card data to be identified and replaced with an anonymous token, which along with the true card number, is stored in a secure data vault managed by the tokenization provider.

Akamai has integrated its cloud technology with the tokenization solutions from its partner CyberSource, enabling Akamai’s customers integration to enterprise payment tokenization services.

“We’ve always maintained merchants shouldn’t seek to secure payment data, but instead, eliminate contact with it,” said Michael Walsh, president and chief executive officer, CyberSource. “Akamai’s Edge Tokenization automatically combines the concept of hosted payment acceptance and payment tokenization with cloud-based web infrastructure, making it easy for online merchants to meet compliance requirements with less cost, complexity and time.”

“PCI DSS compliance has been a cost of doing business and can be substantial. For example, the reported cost for annual compliance assessments can be well into six figures and this does not count the costs to change systems and operations to become compliant,” states Michael Suby, vice president of research at Stratecast. “Leveraging a service like Edge Tokenization offers eCommerce companies an innovative way to reduce these costs while still protecting against card data breaches.”

Akamai interacts with existing payment gateway Application Programming Interfaces (APIs) to tokenize card and cardholder information without ever storing higher-risk data to disk. Because this transaction occurs on Akamai’s level 1 PCI-compliant network, this replacement occurs securely and close to the end user, which further reduces potential risks.

Advertisement. Scroll to continue reading.

Additionally, by removing credit card data from the online merchant’s infrastructure, Edge Tokenization helps customers conduct business more confidently in the cloud.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...