Dairy Queen, Carl's Jr., and Buffalo Wings & Rings are among those operators topping point of sale headlines this month. Meanwhile, new solutions from the vendor community focused on encryption, payroll processing modules and more.
The HyperSafe Secure EFTSec Server 2.0 point-to-point payment data encryption system encrypts cardholder data during transaction processing, starting at the payment terminal and ending at a trusted point where the data is decrypted.
Magnolia Hotels leverages a PCI compliant, cloud-based property management system to secure sensitive information while centralizing proprietary guest data across five properties. The result: thousands upon thousands of dollars in additional revenue.
Dairy Queen Corp. has selected Vendor Safe Technologies as an endorsed and preferred provider of Payment Card Industry Data Security Standard compliance solutions to its network of 5,000+ North American locations.
Although the new versions will not introduce any new major requirements, they will include a number of key updates and clarifications.
To avoid paying credit-card fees, some restaurants are taking plastic off of the menu. But can this strategy backfire? The New York Post's Selim Algar reports on this growing trend.
CipherOptics' Virtual IP technology allows customers to secure PCI regulated data over public and private networks simultaneously with a single solution.
Hospitality Technology surveyed its audience of IT professionals to determine how their companies are faring in 2010, and to pinpoint the technologies and initiatives that are top of mind for the year ahead. We also asked a select group of restaurant and hotel operators to provide detailed answers to some of our burning questions regarding customer engagement, Payment Card Industry standards and more.
The partnership will add a high-speed payments gateway as well as comprehensive reporting capabilities to MSI's property management system.
From tableside and self-service solutions to password protection and data encryption technologies, HT rounds up the latest solutions that will help operators to combat hospitality hackers. Plus, learn the 15 most common ways that hackers infiltrate information technology systems.