Verimatrix Key Shield Improvements Simplify SoftPOS Security Implementations and Bolster Threat Defenses

Verimatrix Key Shield Improvements Simplify SoftPOS Security Implementations and Bolster Threat Defenses

Verimatrix, (Euronext Paris: VMX) (Paris:VMX), the leader in powering the modern connected world with people-centered security, today announced that Verimatrix Key Shield, its award-winning engineering toolkit relied upon by organizations around the world to protect cryptographic keys, now offers enhanced features that greatly streamline implementations for SoftPOS solutions. Software Point of Sale (SoftPoS) is new technology which allows merchants to accept card payments directly on their phone.

Used to create a cryptographic architecture that keeps hackers from anticipating how to analyze and attack apps, Verimatrix Key Shield technologies dissolve cryptographic keys into the code and obscures algorithms to keep applications and data safe in consumer-facing environments such as SoftPOS.

Also Read: World Password Day: Organizations Should Start Incorporating Passwordless Solutions

Today’s Verimatrix Key Shield offers unmatched flexibility, enabling customers such as banks, retailers and other SoftPOS users to add their own algorithm support and go to market faster. As part of the recent enhancements, Key Shield now supports Remote Key Injection using the TR-31 key block, as well as AES DUKPT, a security key management standard. TR-31 and AES DUKPT cipher usage continues to gain momentum and the addition of these ciphers to Key Shield will allow users additional cipher options. It also supports the following common algorithms used in payments, including 3DES, 3DES MAC, AES, AES CMAC, AES GCM, ECC Key Generation, ECDH, ECDSA, HKDF, HMAC, RSA and SHA.

“Verimatrix brings highly-valued development efficiencies that provide a speedier path to market,” said Asaf Ashkenazi, Chief Operating Officer and President at Verimatrix. “These enhancements for Key Shield underscore Verimatrix’s commitment to streamlining security implementations so that they serve as a business enabler rathar than a cumbersome step in the deployment process.”

For more such updates follow us on Google News ITsecuritywire News. Please subscribe to our Newsletter for more updates.