Page 19 - GS240302
P. 19

Views



        accessed from anywhere with an internet connection,
        which has simplified deployment and management
        for merchants and providers alike. Fong further noted
        that modern TMSs have enhanced security to protect
        against fraud and data breaches. Advancements in
        encryption, tokenization and other security features
        protect sensitive information, he pointed out, adding
        that unlike monolithic predecessors, next-generation
        TMSs can be integrated into other enterprise systems,
        such as inventory management, CRM and accounting
        software,  to eliminate  redundancies  and  streamline
        operations.

        Using advanced analytics, Fong added, modern TMSs
        provide insights on transaction trends, customer
        behavior, and operational performance. Fong also said
        these insights can help merchants manage hardware
        fleets and stay informed. Modern TMSs are mobile-
        compatible, which makes them easy to access and
        manage from anywhere on smartphones and connected
        devices, he added.
        Drive best-in-class security
        Reflecting  on   recent  changes   in  encryption
        methodologies, Fong stated that encryption algorithms
        have become more complex and offer greater security
        against brute-force attacks. Modern key management
        systems (KMS) enable service providers to securely
        manage keys throughout their lifecycle, from
        generation and storage to distribution. Remote key
        injection,  which  distributes  encryption  keys  over  a
        secure IP network, has also simplified KMS.

        With looming threats of quantum computing attacks
        that could potentially crack public key infrastructure,
        Fong stressed the need for encryption methods that are
        quantum-attack resistant, noting that post-quantum
        cryptography is being developed to address this
        challenge.Fong has also seen growing adoption of end-
        to-end encryption (E2EE) that secures data in transit
        and at rest. He explained that E2EE data is encrypted
        on the sender's device and can only be decrypted by
        the intended recipient.
        Meet the new pull-through

        A hundred years after Ford's gasoline jalopy roared
        through  the streets  of Detroit, electric  vehicle
        manufacturers are remotely updating car firmware
        and software. Some even sell directly to consumers,
        disintermediating traditional car dealers. The pull-
        through game has changed. With SaaS driving
        recurring revenue, quarters no longer reset to zero.
        And savvy distributors can get you the car or POS
        device you want in any color. .
        Dale S. Laszig, senior staff writer at The Green Sheet and founder
        and CEO at DSL Direct LLC, is a payments industry journalist
        and content strategist. Connect via email  dale@dsldirectllc.com,
        LinkedIn  www.linkedin.com/in/dalelaszig/  and Twitter  https://
        twitter.com/DSLdirect.

                                                                                                                19
   14   15   16   17   18   19   20   21   22   23   24