SYDNEY, AUS/ PALM BEACH GARDENS, Fla. – 6 Aug 2014 –Wontok, Inc.’s Co-founder and SVP, Product Management, Paul Murray along with Rich Cameron, VP, Global Operations will be presenting this morning at the Retail Solutions Providers Association’s annual RSPA RetailNOW 2014 Conference, Orlando. Their educational presentation “To Be Breached or Not to Be Breached in a Malware-infested World isn’t the Question: Protecting Your Customers Transactions Is” will be in two parts:
- Part one: A forensic breakdown of the Target Breach will provide details of Target’s data breach along with other retailers and retail industry security issues important for RSPA members and their customers.
- Part two: A Malware Prevention POS Security Approach explores data security standards, PCI compliance, education exploring the evolving multilayered approach of technologies used to secure networks and endpoints. Additionally it discusses a combination of best practices including an overview of top analyst recognized multilayered security approach supported by Wontok.
As evidenced by the fact that most breached retailers were PCI Compliant across many requirements, many analysts and experts are taking the position that PCI Compliance does not equal security. Wontok discusses the importance for compliance but also the need to reach beyond continuously for improving systems and processes to be able to keep up with the cyber criminals.
PCI DSS and other standards driven bodies today are primarily concentrated on trying to stop malware getting onto the network and yet, dwell time, the amount of time malware sits in a network undetected, shows malware goes undetected for up to eight months during a breach, meaning it does get in but then is undetected.
Wontok’s innovative data security solutions are built with the assumption that malware is already inside the network or endpoint. Wontok™ SafeCentral patented technology provides a containerized environment to make each transaction safe in the Point-of-Sale [POS] environment by separating it from the network and isolating it from data stealing malware.This essentially keeps the malware outbreak away from the core business application.