PCI DSS
In 2006 the payment brands (American Express, Discover Financial Services, JCB, MasterCard Worldwide and Visa Inc.) founded the PCI SSC (Payment Card Industry Security Standards Council), a global forum responsible for the development, management, education, and awareness of the PCI Security Standards. In the meantime PCI Data Security Standards (PCI DSS) came into force that all market players which store, process or transmit cardholder data must comply with.
AperSky Consulting Llc. – as the only local company in Hungary – employs three Qualified Security Assessors and offers a full range of PCI DSS services to its customers.
More »
PCI 3DS
In October 2017, 3D-Secure Standard version 2.0 was released, developed in collaboration between the PCI Security Standards Council and EMVCo. The technical specification was provided by EMVCo while the Council summarized the standard security and audit requirements in the PCI 3DS Core and SDK Security Standard documents.
More »
PCI PIN Security
In August 2018, the PIN Security standard version 3.0 was released by the PCI Council, summarizing security requirements for PIN-based payment transactions, including PIN management, processing and transmission.
More »
PCI CPSA
In June 2022, the Card Prouduction Security Assessor physical and logical standards version 3.0.1 were released by the PCI Council, summarizing security requirements for vendors involved in payment card production.
More »
Full range of payment card competences
One of the the primary aim for the foundation of our company was to establish a professional team that is capable of supporting customers on the highest level principally in the field of the payment card and electronic transaction processing. We believe that we have successfully achieved this goal: most of our experts have more than 10-15 years experience in the payment card business..
More »
Focus on Security Awareness
Nowadays different kinds of hacker attacks and data losses due to deficient information systems are considered as the most threatening IT risks. Unfortunately, day by day we can see distressing examples in the media: unauthorized data access, seizing control over computers, or other damages caused by technical offense. These crimes result in really serious damages and not only on IT level: they can also deteriorate significantly the affected company’s prestige that can inhibit its business sustainability and development.
More »
|