Validated P2PE solutions use secure and validated cryptographic hardware devices along with rigorous security practices to encrypt data from the point of interaction (POI), a hardened, tamper-responsive encrypting card reader validated under the PCI PTS standard, until the data reaches the solution provider's secure decryption environment.
“PCI P2PE represents the most stringent set of controls while offering the potential for significant scope reduction for merchants.”
Schellman provides QSA (P2PE) and PA-QSA (P2PE) services for the validation of P2PE Solutions and P2PE Applications respectively.
Our Schellman teams have experience performing hundreds of PCI validations.
We’re here to answer any questions.