News

Computop, Eckoh team up to streamline security for card-not-present payments

Tuesday 18 August 2020 10:02 CET | News

Computop, a global payment processor, and Eckoh, the global provider of Secure Payment products and Customer Contact solutions, have partnered to further augment payment security for card-not-present (CNP) payments.

Through this relationship, retailers benefit from streamlined payment security across every channel, increasing customer satisfaction.

Rapid innovation, change in consumer preferences, and unpredictable external factors mean businesses must remain agile while still offering enhanced payment security. Computop provides retailers worldwide with omnichannel solutions for payment processing and fraud prevention. Its Paygate payment platform processes payments across every channel, including ecommerce, at the POS, and via mobile devices.

Eckoh provides PCI DSS-compliant secure payment solutions to many large enterprises in the UK and US to ensure that sensitive payment and personal data never enters the contact centre environment when a CNP payment is taken. By doing this, Eckoh provides a way to minimise fraud risk, secure sensitive data, and become PCI DSS compliant. Its products, which include the patented CallGuard and ChatGuard, can be hosted in the Cloud or deployed on the client’s site and remove sensitive personal and payment data from contact centres and IT environments.

Eckoh has been a PCI DSS Level One Accredited Service Provider since 2010, and its clients come from different vertical markets, including government departments, telecoms providers, retailers, utility providers, and financial services organisations.


More: Link


Free Headlines in your E-mail

Every day we send out a free e-mail with the most important headlines of the last 24 hours.

Subscribe now

Keywords: Computop, Eckoh, CNP, card-not-present, retailers, payment security, payment platform, ecommerce, POS
Categories: Securing Transactions | Digital Identity, Security & Online Fraud
Countries: World
This article is part of category

Securing Transactions