Revention to Provide Increased Credit Card Security Standards
Revention, a provider of restaurant management solutions, is pursuing the highest level of credit card compliance based on the recently released Payment Card Industry (PCI) Data Security Standard. The PCI Standards list was developed by all major credit card issuers, and includes best practices for stored, processed, or transmitted credit card data.
Revention CEO Jeff Doyle says, "Protecting our customers' data is one of our highest priorities. As point-of-sale (POS) security breaches become increasingly common among retailers, it is imperative that all POS providers carefully examine their existing data protection procedures for vulnerabilities. Our goal is to be proactive rather than reactive, and as a result, we are working diligently to provide our customers with the most advanced cardholder data protection available."
To ensure that customer credit card data is protected, Revention has implemented new operational and application securities designed to satisfy PCI cardholder data protection procedures: build and maintain a secure network, protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test networks, and maintain an information security policy.
Revention CEO Jeff Doyle says, "Protecting our customers' data is one of our highest priorities. As point-of-sale (POS) security breaches become increasingly common among retailers, it is imperative that all POS providers carefully examine their existing data protection procedures for vulnerabilities. Our goal is to be proactive rather than reactive, and as a result, we are working diligently to provide our customers with the most advanced cardholder data protection available."
To ensure that customer credit card data is protected, Revention has implemented new operational and application securities designed to satisfy PCI cardholder data protection procedures: build and maintain a secure network, protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test networks, and maintain an information security policy.