Agreement provides for LevelUp to Integrate via Cloud Connect to NCR restaurant POS Systems.
A modern point of sale roll-out provides customer analytics in addition to helping DelGrosso's Amusement slash costs and ensure PCI compliance.
The updated version offers stronger mobile security by addressing industry loopholes and using cloud to verify credit card users' identity with photos.
Agilysys announces general availability of the latest version of InfoGenesis that features simplified architecture, infrastructure enhancements.
Alaric has launched the myPinPad product that offers EMV-level security and enables processing of mag-strip or chip cards.
CKE Restaurants inks security and compliance service agreement with ControlScan.
Using social media to drive business is no longer a new concept, but when it's used to generate buzz for a brand that hasn't even broken ground yet, that is truly forward-thinking. HT talks to Daniel Kim, founder of Red Mango USA, about how he envisioned a bold new future for frozen yogurt, not only through product development but by creating a digital culture that would appeal to the unique and devoted customers the company was cultivating through social media channels and loyalty programs.
Fortinet's Kevin Flynn talks about the impact that consumer mobile devices are having on networks, and it's not all about bandwidth. There's a growing security threat that the industry will have address. Flynn shares strategies that can provide secure networking for customers with simplified more affordable management for businesses.
In this annual round-up of new POS hardware, HT gathers details and tech specs on many of the latest releases to hit the market, from terminals and mobile tablets to printers and customer displays. New releases focus on compact, energy-efficient and durable design.
With the ever-changing payment landscape, security is a top concern for hospitality operators. In an increasingly mobile culture there are more touchpoints than ever that need protection from data breaches. This report highlights several of the latest additions to the security landscape that run the gamut from wireless networks, tokenization, encryption, and PCI requirements.