Tokenization Beyond Payments

Tokenization Beyond Payments

As the technology behind payments becomes more advanced and readily available, so too are the possibilities for fraud. The Federal Trade Commission’s online database of consumer complaints reports 13 million complaints from 2012-2016, 42% of which were fraud related, and 13%, identity theft complaints.

Type: White Paper

Sponsor: Rambus


Business Continuity Management Essential to Keeping Payments Flowing

Business Continuity Management Essential to Keeping Payments Flowing

Data is the lifeblood of business and the ability to seamlessly and efficiently handle payments is essential to keep cash flowing and customers happy. This infographic explores good practices in business continuity management to ensure you can continue to accept data and payments uninterrupted.

Type: Infographic

Sponsor: TNS, Inc.


Ransomware Attacks a Major Threat

Ransomware Attacks a Major Threat

Ransomware attacks have been increasing at an alarming rate and are now one of the main types of data breaches. Download this infographic for a more in-depth look at this new phenomenon.

Type: Infographic

Sponsor: TNS, Inc.


New Data Breach Patterns Emerge

New Data Breach Patterns Emerge

Data breaches have continued to hit the headlines. Download this new infographic which looks at some interesting updates from recent industry reports, including who the top perpetrators are, the tactics and motivations behind the attacks, and which industries are being targeted.

Type: Infographic

Sponsor: TNS, Inc.


ATM File Exchange Services - Case Study

ATM File Exchange Services - Case Study

FSS enables India's largest public sector bank reduce ATM management cost and supports timely resolution of customer disputes.

Type: Case Study

Sponsor: FSS


FSS Shoring Defenses in Real Time – Instant Payments

FSS Shoring Defenses in Real Time – Instant Payments

Instant Payments compounds challenges related to fraud detection and prevention for financial institutions. Read our latest paper on how FSS can help strengthen anti-fraud mechanisms.

Type: Brochure

Sponsor: FSS


UPI : Leading the Payment Revolution universally

UPI : Leading the Payment Revolution universally

India’s Unified Payment Interface is emerging as a critical growth enabler for digital payments. Read our latest paper on how PSPs can create services differentiation in a fast-growing market.

Type: Brochure

Sponsor: FSS


FSS Toggle

FSS Toggle

Instant Card Control at Your Fingertips

Type: Brochure

Sponsor: FSS


TNS and Bluefin PCI Validated Point-to-Point Encryption | P2PE | Don't let a Data Breach Derail Your Business

TNS and Bluefin PCI Validated Point-to-Point Encryption | P2PE | Don't let a Data Breach Derail Your Business

Don't let a data breach derail your business. Bluefin's PCI-validated P2PE solutions encrypt cardholder data at the point of interaction and are available to all merchants and processors utilizing the TNS network

Type: Brochure

Sponsor: TNS, Inc.


FSS Issuance Suite

FSS Issuance Suite

Deliver Differentiated Payments Experience

Type: Brochure

Sponsor: FSS


FSS Instant Payments

FSS Instant Payments

New Payment Rails for Real-Time Transfers

Type: Brochure

Sponsor: FSS


TNS and Ingenico Group Managed POS Encryption | Transport Encrypted Credit, Debit & Other Card-Based Transactions | Payments Security

TNS and Ingenico Group Managed POS Encryption | Transport Encrypted Credit, Debit & Other Card-Based Transactions | Payments Security

Simplify payment acceptance and compliance with a fully managed solution for the transport of encrypted credit, debit and other card-based payment transactions. TNS' Managed POS Encryption service, in partnership with Ingenico Group, is ideally suited to merchants and processors. Download our product overview to learn more.

Type: Brochure

Sponsor: TNS, Inc.



View all Topics View by Company

This research center deals with perhaps the most sensitive topic in the mobile payments industry – security. We cover fraud prevention for your business, privacy issues, regulation, malware, hacking, shortcodes, privacy, lost or stolen phones, and EMV.

News