Story image

Retail sector vulnerable to threats, Intel Security seeks solution

29 Apr 2015

In order to provide better retail kiosk security options, Intel Security is collaborating with Kiosk Information Systems, the custom self-service solutions provider.

As a result of the partnership, Kiosk now offers licencing options to allow users to secure their self-service retail platforms with Intel Security’s McAfee Integrity Control technology before shipment and installation.

This enables safer connected Internet of Things (IoT) devices used by consumers and global retailers, says Intel.

According to Intel, retailers are facing significant control, security and compliance challenges, and there is a need for cybersecurity solutions to protect the growing number of connected devices used in the retail industry.

Last year was considered the year of the retail data breach, and this year connected technologies in the industry will continue to grow as retailers look for ways to better serve their customers’ needs, Intel says.

Furthermore, more than three billion people are currently online worldwide, and it’s estimated that 75 billion devices will be connected by 2020, including millions of POS devices.

The data on these devices is attractive to hackers looking to leverage credit card information and other customer data for their own financial gain, says Intel.

Built-in security is a key element in the effort to reduce the risks to businesses and consumers, the company says.

“By adding Intel Security’s technology as an integral part of our services offerings, Kiosk will be able to continue to deliver optimal security positioning for retailers to use globally, while maintaining a high-level of protection for consumers.

“It’s also an excellent way to differentiate our solutions by addressing some of today’s most pressing customer data security issues,” says Tom Weaver, Kiosk CEO.

McAfee Integrity Control provides protection for retail devices including self-service transactional kiosks.

The solution combines antivirus, application control and dynamic whitelisting abilities, with McAfee Endpoint Protection Suite and McAfee ePolicy Orchestrator Deep Command software.

Retail System Providers can tailor performance for new and legacy devices, as well as address some of the requirements outlined by the Payment Card Industry Data Security Standards (PCI DSS) council.

“Now more than ever before, retailers must be ever-vigilant in protecting the valuable information they hold,” says Tom Moore, Intel Security vice president of world-wide embedded sales.

“It’s important for consumers to know that companies like Kiosk are working to protect their financial information from cyber threats, by trusting Intel to ingrain security deep into the framework of its retail systems,” he says.

Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”